Companies face increasing risk to their operations resulting from a cyber breach of a critical vendor. We have recently written about creating a sensible cybersecurity and AI risk framework for critical vendors, and regulators have issued both formal and informal guidance addressing vendor cybersecurity risk management: The SEC, the New York’s Department of Financial Services, the FTC, FINRA, the CFTC/NFA and U.S. federal banking agencies have all issued guidance on vendor cybersecurity due diligence, oversight, auditing, and contractual provisions to reduce vendor risk before a data breach.
In this Debevoise Data Blog post, we provide the following 27 questions to ask when you’ve been informed that one of your vendors has experienced a data breach:
Internal Questions
- What categories of Company data does the vendor have? How sensitive is it?
- What is the volume of data that the vendor has?
- Is the Company providing the vendor with data on an ongoing basis?
- Does the vendor have direct access to the Company’s network?
- Should we stop any data flows and disable the vendor’s access to Company systems until we learn more?
- What are the business continuity risks if we cut off our relationship with this vendor?
- Do we have cyber insurance? Does it cover damage from vendor breaches? What is the deductible? Do we need to notify our insurer?
- If any of our data was involved, do we have regulatory, statutory or contractual notification obligations? If so, do we want to make those notifications or do we want the vendor to make them?
- Depending on what data was involved, are there steps the Company should be taking to reduce risk, such as alerting customers whose data may have been impacted or looking for attempted BECs and wire diversions schemes?
- What do the relevant contracts with the vendor say about its cybersecurity obligations, breach notification requirements, indemnity, cooperation, limitations of liability, termination rights, etc.?
- What cyber diligence was done on the vendor?
Questions for the Vendor about the Incident
- What is the impact of the incident on the vendor’s operations?
- Is there any reason to believe that the Company’s systems are at risk? If so, what indicators of compromise should we be looking for?
- If the vendor has direct access to the Company’s systems, what assurances can be provided as to why it is safe to allow that access to continue?
- Is any Company data held by the vendor at risk?
- Have you confirmed that any Company data was accessed or exfiltrated? If so, can we obtain a copy of the data?
- Do you know who the attackers are or the purpose of the attack?
- Do you have any reason to believe that Company data was targeted?
- Is there any reason to believe that that any of the data that was involved has been misused?
- Have you retained an outside law firm and cyber firm to assist?
- Are you conducting Dark Web monitoring? What are the results?
- When did the compromise of our Company data first occur?
- When did you discover the compromise?
- What steps have been taken to contain the breach?
- Do you know how the attacker got into the system, and if so, has that vulnerability been closed?
- Does the attacker still have access to your system? If not, when was the last time the attacker was observed in the system?
- Who else have you notified (law enforcement, regulators, customers, etc.)?
To subscribe to the Data Blog, please click here.
The authors would like to thank Debevoise summer associate Dylan Sanders for his contribution to this blog post.