SlideShare a Scribd company logo

Infographic: Third-Party Risks: The cyber dimension

Corporate treasury is now a top target for cyber-criminals. Treasury’s trove of personal and corporate data, its authority to make payments and move large amounts of cash quickly, and its often complicated structure make it an appealing choice for discerning fraudsters.

1 of 1
Download to read offline
THIRD-
PARTY
RISKS:
The cyber
dimension
In April–May 2017 The Economist Intelligence Unit (EIU), on behalf of Deutsche Bank,
surveyed 300 senior corporate treasurers from across the globe, to find out how they are
responding to cyber risks and opportunities posed by third parties. Based on these
survey findings, this infographic explores where these evolving risks and opportunities
occur. It highlights what they may mean for the corporate treasurer in terms of reducing
identified vulnerabilities and exploring how they can stay ahead of cyber-criminals.
59% use both internal
and external testing 33% only use
internal testing
have methods for enforcing
additional customer
identification in high risk
scenarios but in the
following sectors the
percentage is much lower:
have methods for enforcing
additional customer
identification in high risk
scenarios but in the
following sectors the
percentage is much lower:
83%
43%
of professional
service firms
25%
of construction
and real estate
companies
44%
38%
of manufacturing
companies are
not checking
construction/
real estate
38% of agricultural
companies are
not checking
of natural
resource
companies
47%
32% of energy companies
are not checking
of respondents check legal
compatibility but
vulnerabilities remain
80%
25% agricultural
25% chemical
19% automotive
provide formal
training for
contract
workers
of companies require
formal training for
corporate treasurer
employees
provide formal
training for
third-party
vendors
92% 77% 53%
How data is maintained impacts
business continuity.
How data is maintained impacts
business continuity.
Regulation is often blamed for increasing cost,
reducing efficiency and generally complicating business
relationships – and yet
Regulation is often blamed for increasing cost,
reducing efficiency and generally complicating business
relationships – and yet
RISK CONTAGION RISKS CAN EMERGE FROM SECTORS WITH LOWER DUAL TESTING APPROACHES
SECTORS THAT HAVE DUAL TESTING
2
When it comes to using, sharing and keeping data,
companies need to be certain of two things:
The information about individuals and companies has been authenticated as part
of KYC and AMLprocedures
That they and their third-party suppliers are using the same data sovereignty laws
Not all companies in all sectors are checking
that their suppliers are using the same
identity authentication methods
3
To limit the threat of a data breach, access to confidential
information has to be controlled.
RISK IF COMPANIES DO NOT HAVE AN IN-HOUSE PROCESS, IT MAY NOT ONLY EXPOSE THEM
BUT ALSO THEIR CLIENTS TO UNNECESSARY RISKS
RISK BY NOT PARTICIPATING COMPANIES ARE MISSING OUT ON LEARNING WHICH STRATEGIES
AND PRACTICES WORK BEST
93%
96%
of respondents have taken
full steps over the past 12
months to ensure that
there are employee access
controls to confidential
company information/
documentation
of respondents have
an in-house process to
ensure limitations on
third-party access to
their systems data
4
5
of companies keep a
complete inventory of
all third-party suppliers
that handle employee
and customer data
85% of companies do not
require third-party
suppliers to have
procedures in place to
handle data breaches
20%
Cyber-security information sharing partnerships allow companies to exchange cyber-threat
information in a confidential way in real time which helps to increase awareness of risk.
of respondents participate
in cyber-security
information sharing
partnerships with other
financial institutions
of financial
institutions
participated
in these
partnerships
70%
78%
of respondents say
financial regulation
definitely has a
positive effect when
working with third
parties
said it has a
somewhat
positive effect
39%
RISK THIRD PARTIES THAT DO NOT COMPLY WITH CHANGES IN FINANCIAL REGULATIONS MAY
LOSE CUSTOMER LOYALTY
AUTHENTICATION
EMPLOYEE &THIRD-PARTY
ACCESS &TRAINING
DATA SECURITY
A REGULATORY SURPRISE
44%
PENETRATION TESTING
The use of simulations to determine what type of damage could result if IT systems
are attacked from an internal or external source – is critical for a company’s health.
1
SECURITY TESTING
Source: The Economist Intelligence Unit survey, April–May 2017
Copyright: © The Economist Intelligence Unit, 2017

Recommended

The Security of Electronic Health Information Survey
The Security of Electronic Health Information SurveyThe Security of Electronic Health Information Survey
The Security of Electronic Health Information Surveyloglogic
 
Infographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyInfographic: Symantec Healthcare IT Security Risk Management Study
Infographic: Symantec Healthcare IT Security Risk Management StudyCheapSSLsecurity
 
IG004 Litigation Cost Trends 2014_FINAL
IG004 Litigation Cost Trends 2014_FINALIG004 Litigation Cost Trends 2014_FINAL
IG004 Litigation Cost Trends 2014_FINALAmber Bytheway
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicPing Identity
 
Its 2019 - Should Pharma Still Be Scared of Digital?
Its 2019 - Should Pharma Still Be Scared of Digital?Its 2019 - Should Pharma Still Be Scared of Digital?
Its 2019 - Should Pharma Still Be Scared of Digital?Gary Monk
 
internet promotions
internet promotionsinternet promotions
internet promotionsnewvision2
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational GapPing Identity
 

More Related Content

What's hot

Wiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedWiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedBritt Newton
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?David Hunt
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | InfographicPing Identity
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapPing Identity
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
The Evolving Role of the CSO
The Evolving Role of the CSOThe Evolving Role of the CSO
The Evolving Role of the CSOIDG
 
TNS Infographic - Data Breach Targets Revealed
TNS Infographic - Data Breach Targets RevealedTNS Infographic - Data Breach Targets Revealed
TNS Infographic - Data Breach Targets RevealedTNSIMarketing
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industrySOCRadar Inc
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and SecurityPYA, P.C.
 
Ready or Not? Compliance in a World of New Models
Ready or Not? Compliance in a World of New ModelsReady or Not? Compliance in a World of New Models
Ready or Not? Compliance in a World of New ModelsPYA, P.C.
 
What's an Opt-Out Policy
What's an Opt-Out PolicyWhat's an Opt-Out Policy
What's an Opt-Out Policytermsfeed
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry Seqrite
 
Protecting Health Data_FINAL3
Protecting Health Data_FINAL3Protecting Health Data_FINAL3
Protecting Health Data_FINAL3Paul Petronelli
 
The Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare FacilitiesThe Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare FacilitiesMatthew J McMahon
 
ACI's 4th Annual Biosimilars Forum
ACI's 4th Annual Biosimilars ForumACI's 4th Annual Biosimilars Forum
ACI's 4th Annual Biosimilars ForumRachel Hamilton
 

What's hot (20)

Wiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedWiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealed
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?
 
DKapellmann_Security Compliance Models
DKapellmann_Security Compliance ModelsDKapellmann_Security Compliance Models
DKapellmann_Security Compliance Models
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical Gap
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
 
The Evolving Role of the CSO
The Evolving Role of the CSOThe Evolving Role of the CSO
The Evolving Role of the CSO
 
TNS Infographic - Data Breach Targets Revealed
TNS Infographic - Data Breach Targets RevealedTNS Infographic - Data Breach Targets Revealed
TNS Infographic - Data Breach Targets Revealed
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industry
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and Security
 
Ready or Not? Compliance in a World of New Models
Ready or Not? Compliance in a World of New ModelsReady or Not? Compliance in a World of New Models
Ready or Not? Compliance in a World of New Models
 
What's an Opt-Out Policy
What's an Opt-Out PolicyWhat's an Opt-Out Policy
What's an Opt-Out Policy
 
Executive summary - App nations
Executive summary - App nationsExecutive summary - App nations
Executive summary - App nations
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
 
Protecting Health Data_FINAL3
Protecting Health Data_FINAL3Protecting Health Data_FINAL3
Protecting Health Data_FINAL3
 
The Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare FacilitiesThe Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare Facilities
 
ACI's 4th Annual Biosimilars Forum
ACI's 4th Annual Biosimilars ForumACI's 4th Annual Biosimilars Forum
ACI's 4th Annual Biosimilars Forum
 
Cloud complexity: the need for resilience
Cloud complexity: the need for resilienceCloud complexity: the need for resilience
Cloud complexity: the need for resilience
 

Similar to Infographic: Third-Party Risks: The cyber dimension

The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...Capgemini
 
2015 Corporate general counsel survey results
2015 Corporate general counsel survey results2015 Corporate general counsel survey results
2015 Corporate general counsel survey resultsGrant Thornton LLP
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Khaled El Emam
 
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsKate Tomlinson
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesThe Economist Media Businesses
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FinTech Belgium
 
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016Harmaldeep Cassam
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
How Third Party Risk is Becoming More Challenging in 2023
How Third Party Risk is Becoming More Challenging in 2023How Third Party Risk is Becoming More Challenging in 2023
How Third Party Risk is Becoming More Challenging in 2023360factors
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?- Mark - Fullbright
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Marcello Marchesini
 
Outsourcing security survey0706 (1)
Outsourcing security survey0706 (1)Outsourcing security survey0706 (1)
Outsourcing security survey0706 (1)brijesh singh
 

Similar to Infographic: Third-Party Risks: The cyber dimension (20)

The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
 
Privacy Risk Study 2023 – Executive Summary.pdf
Privacy Risk Study 2023 – Executive Summary.pdfPrivacy Risk Study 2023 – Executive Summary.pdf
Privacy Risk Study 2023 – Executive Summary.pdf
 
2015 Corporate general counsel survey results
2015 Corporate general counsel survey results2015 Corporate general counsel survey results
2015 Corporate general counsel survey results
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
How Third Party Risk is Becoming More Challenging in 2023
How Third Party Risk is Becoming More Challenging in 2023How Third Party Risk is Becoming More Challenging in 2023
How Third Party Risk is Becoming More Challenging in 2023
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
Outsourcing security survey0706 (1)
Outsourcing security survey0706 (1)Outsourcing security survey0706 (1)
Outsourcing security survey0706 (1)
 

More from The Economist Media Businesses

Digital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANDigital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANThe Economist Media Businesses
 
Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...The Economist Media Businesses
 
Lung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking awayLung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking awayThe Economist Media Businesses
 
Intelligent Economies: AI's transformation of industries and society
Intelligent Economies: AI's transformation of industries and societyIntelligent Economies: AI's transformation of industries and society
Intelligent Economies: AI's transformation of industries and societyThe Economist Media Businesses
 
Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...The Economist Media Businesses
 
An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...The Economist Media Businesses
 
EIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schoolsEIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schoolsThe Economist Media Businesses
 
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...The Economist Media Businesses
 
M&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruptionM&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruptionThe Economist Media Businesses
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionThe Economist Media Businesses
 
In Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocationsIn Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocationsThe Economist Media Businesses
 
Asia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and ResponsibilityAsia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and ResponsibilityThe Economist Media Businesses
 
Risks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For NowRisks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For NowThe Economist Media Businesses
 
In North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to EquitiesIn North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to EquitiesThe Economist Media Businesses
 
Balancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEABalancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEAThe Economist Media Businesses
 
EMEA: Investors keeping their focus on the longer-term
EMEA: Investors keeping their focus on the longer-termEMEA: Investors keeping their focus on the longer-term
EMEA: Investors keeping their focus on the longer-termThe Economist Media Businesses
 

More from The Economist Media Businesses (20)

Food for thought: Eating better
Food for thought: Eating betterFood for thought: Eating better
Food for thought: Eating better
 
Digital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANDigital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEAN
 
Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...
 
Next-Generation Connectivity
Next-Generation ConnectivityNext-Generation Connectivity
Next-Generation Connectivity
 
Lung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking awayLung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking away
 
How boards can lead the cyber-resilient organisation
How boards can lead the cyber-resilient organisation How boards can lead the cyber-resilient organisation
How boards can lead the cyber-resilient organisation
 
Intelligent Economies: AI's transformation of industries and society
Intelligent Economies: AI's transformation of industries and societyIntelligent Economies: AI's transformation of industries and society
Intelligent Economies: AI's transformation of industries and society
 
Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...
 
Communication barriers in the modern workplace
Communication barriers in the modern workplaceCommunication barriers in the modern workplace
Communication barriers in the modern workplace
 
An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...
 
EIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schoolsEIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schools
 
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
 
M&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruptionM&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruption
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
In Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocationsIn Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocations
 
Asia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and ResponsibilityAsia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and Responsibility
 
Risks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For NowRisks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For Now
 
In North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to EquitiesIn North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to Equities
 
Balancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEABalancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEA
 
EMEA: Investors keeping their focus on the longer-term
EMEA: Investors keeping their focus on the longer-termEMEA: Investors keeping their focus on the longer-term
EMEA: Investors keeping their focus on the longer-term
 

Recently uploaded

Q4 2023 Conference Call Presentation FINAL-v4.pdf
Q4 2023 Conference Call Presentation FINAL-v4.pdfQ4 2023 Conference Call Presentation FINAL-v4.pdf
Q4 2023 Conference Call Presentation FINAL-v4.pdfAdnet Communications
 
Chartered accountant in delhi (top 10 CA in delhi)
Chartered accountant in delhi (top 10 CA in delhi)Chartered accountant in delhi (top 10 CA in delhi)
Chartered accountant in delhi (top 10 CA in delhi)supriyadmpinstitute
 
Stock Market Brief Deck for 2:22 youtube vid.pdf
Stock Market Brief Deck for 2:22 youtube vid.pdfStock Market Brief Deck for 2:22 youtube vid.pdf
Stock Market Brief Deck for 2:22 youtube vid.pdfMichael Silva
 
Stock Market Brief Deck for 2:27 yt vid.pdf
Stock Market Brief Deck for 2:27 yt vid.pdfStock Market Brief Deck for 2:27 yt vid.pdf
Stock Market Brief Deck for 2:27 yt vid.pdfMichael Silva
 
Units States Economic History Lecture 15
Units States Economic History Lecture 15Units States Economic History Lecture 15
Units States Economic History Lecture 15Gale Pooley
 
letter to the EF and Premiership about pension liabilities
letter to the EF and Premiership about pension liabilitiesletter to the EF and Premiership about pension liabilities
letter to the EF and Premiership about pension liabilitiesHenry Tapper
 
Stock Market Brief Deck for 2/21/24 .pdf
Stock Market Brief Deck for 2/21/24 .pdfStock Market Brief Deck for 2/21/24 .pdf
Stock Market Brief Deck for 2/21/24 .pdfMichael Silva
 
20240220 Calibre Q4 and FY 2023 Conference Call Present.pdf
20240220 Calibre Q4 and FY 2023 Conference Call Present.pdf20240220 Calibre Q4 and FY 2023 Conference Call Present.pdf
20240220 Calibre Q4 and FY 2023 Conference Call Present.pdfAdnet Communications
 
Cultural background and entrepreneurial spirit in retail - European Business ...
Cultural background and entrepreneurial spirit in retail - European Business ...Cultural background and entrepreneurial spirit in retail - European Business ...
Cultural background and entrepreneurial spirit in retail - European Business ...Antonis Zairis
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptxFinTech Belgium
 
2024.02-The-radical-option-in-UK-pensions-New-Financial.pdf
2024.02-The-radical-option-in-UK-pensions-New-Financial.pdf2024.02-The-radical-option-in-UK-pensions-New-Financial.pdf
2024.02-The-radical-option-in-UK-pensions-New-Financial.pdfHenry Tapper
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdfFinTech Belgium
 
CHEMAY Treasury Retirement Phase of Super Submission FINAL February 2024.pdf
CHEMAY Treasury Retirement Phase of Super Submission FINAL February 2024.pdfCHEMAY Treasury Retirement Phase of Super Submission FINAL February 2024.pdf
CHEMAY Treasury Retirement Phase of Super Submission FINAL February 2024.pdfHenry Tapper
 
Cybersecurity and Finance - Paradigm shift towards a Global and Real Digital...
Cybersecurity and Finance - Paradigm shift towards a Global and  Real Digital...Cybersecurity and Finance - Paradigm shift towards a Global and  Real Digital...
Cybersecurity and Finance - Paradigm shift towards a Global and Real Digital...Christian Kameir
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptxFinTech Belgium
 
GCF - T&L M&A trends
GCF - T&L M&A trendsGCF - T&L M&A trends
GCF - T&L M&A trendsHugoNaour
 
Demand and Supply Elasticity in Healthcare
Demand and Supply Elasticity in HealthcareDemand and Supply Elasticity in Healthcare
Demand and Supply Elasticity in HealthcareZulfiquer Ahmed Amin
 
National Income National Income National Income
National Income National Income National IncomeNational Income National Income National Income
National Income National Income National Income19920606201903202019
 
Shrambal_Distributors_February_Newsletter_2024.pdf
Shrambal_Distributors_February_Newsletter_2024.pdfShrambal_Distributors_February_Newsletter_2024.pdf
Shrambal_Distributors_February_Newsletter_2024.pdfvikashdidwania1
 

Recently uploaded (20)

Q4 2023 Conference Call Presentation FINAL-v4.pdf
Q4 2023 Conference Call Presentation FINAL-v4.pdfQ4 2023 Conference Call Presentation FINAL-v4.pdf
Q4 2023 Conference Call Presentation FINAL-v4.pdf
 
Chartered accountant in delhi (top 10 CA in delhi)
Chartered accountant in delhi (top 10 CA in delhi)Chartered accountant in delhi (top 10 CA in delhi)
Chartered accountant in delhi (top 10 CA in delhi)
 
Stock Market Brief Deck for 2:22 youtube vid.pdf
Stock Market Brief Deck for 2:22 youtube vid.pdfStock Market Brief Deck for 2:22 youtube vid.pdf
Stock Market Brief Deck for 2:22 youtube vid.pdf
 
Stock Market Brief Deck for 2:27 yt vid.pdf
Stock Market Brief Deck for 2:27 yt vid.pdfStock Market Brief Deck for 2:27 yt vid.pdf
Stock Market Brief Deck for 2:27 yt vid.pdf
 
Units States Economic History Lecture 15
Units States Economic History Lecture 15Units States Economic History Lecture 15
Units States Economic History Lecture 15
 
letter to the EF and Premiership about pension liabilities
letter to the EF and Premiership about pension liabilitiesletter to the EF and Premiership about pension liabilities
letter to the EF and Premiership about pension liabilities
 
Stock Market Brief Deck for 2/21/24 .pdf
Stock Market Brief Deck for 2/21/24 .pdfStock Market Brief Deck for 2/21/24 .pdf
Stock Market Brief Deck for 2/21/24 .pdf
 
20240220 Calibre Q4 and FY 2023 Conference Call Present.pdf
20240220 Calibre Q4 and FY 2023 Conference Call Present.pdf20240220 Calibre Q4 and FY 2023 Conference Call Present.pdf
20240220 Calibre Q4 and FY 2023 Conference Call Present.pdf
 
Cultural background and entrepreneurial spirit in retail - European Business ...
Cultural background and entrepreneurial spirit in retail - European Business ...Cultural background and entrepreneurial spirit in retail - European Business ...
Cultural background and entrepreneurial spirit in retail - European Business ...
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
 
2024.02-The-radical-option-in-UK-pensions-New-Financial.pdf
2024.02-The-radical-option-in-UK-pensions-New-Financial.pdf2024.02-The-radical-option-in-UK-pensions-New-Financial.pdf
2024.02-The-radical-option-in-UK-pensions-New-Financial.pdf
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdf
 
CHEMAY Treasury Retirement Phase of Super Submission FINAL February 2024.pdf
CHEMAY Treasury Retirement Phase of Super Submission FINAL February 2024.pdfCHEMAY Treasury Retirement Phase of Super Submission FINAL February 2024.pdf
CHEMAY Treasury Retirement Phase of Super Submission FINAL February 2024.pdf
 
Cybersecurity and Finance - Paradigm shift towards a Global and Real Digital...
Cybersecurity and Finance - Paradigm shift towards a Global and  Real Digital...Cybersecurity and Finance - Paradigm shift towards a Global and  Real Digital...
Cybersecurity and Finance - Paradigm shift towards a Global and Real Digital...
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptx
 
ComBank Economic Capsule - February 2024
ComBank Economic Capsule - February 2024ComBank Economic Capsule - February 2024
ComBank Economic Capsule - February 2024
 
GCF - T&L M&A trends
GCF - T&L M&A trendsGCF - T&L M&A trends
GCF - T&L M&A trends
 
Demand and Supply Elasticity in Healthcare
Demand and Supply Elasticity in HealthcareDemand and Supply Elasticity in Healthcare
Demand and Supply Elasticity in Healthcare
 
National Income National Income National Income
National Income National Income National IncomeNational Income National Income National Income
National Income National Income National Income
 
Shrambal_Distributors_February_Newsletter_2024.pdf
Shrambal_Distributors_February_Newsletter_2024.pdfShrambal_Distributors_February_Newsletter_2024.pdf
Shrambal_Distributors_February_Newsletter_2024.pdf
 

Infographic: Third-Party Risks: The cyber dimension

  • 1. THIRD- PARTY RISKS: The cyber dimension In April–May 2017 The Economist Intelligence Unit (EIU), on behalf of Deutsche Bank, surveyed 300 senior corporate treasurers from across the globe, to find out how they are responding to cyber risks and opportunities posed by third parties. Based on these survey findings, this infographic explores where these evolving risks and opportunities occur. It highlights what they may mean for the corporate treasurer in terms of reducing identified vulnerabilities and exploring how they can stay ahead of cyber-criminals. 59% use both internal and external testing 33% only use internal testing have methods for enforcing additional customer identification in high risk scenarios but in the following sectors the percentage is much lower: have methods for enforcing additional customer identification in high risk scenarios but in the following sectors the percentage is much lower: 83% 43% of professional service firms 25% of construction and real estate companies 44% 38% of manufacturing companies are not checking construction/ real estate 38% of agricultural companies are not checking of natural resource companies 47% 32% of energy companies are not checking of respondents check legal compatibility but vulnerabilities remain 80% 25% agricultural 25% chemical 19% automotive provide formal training for contract workers of companies require formal training for corporate treasurer employees provide formal training for third-party vendors 92% 77% 53% How data is maintained impacts business continuity. How data is maintained impacts business continuity. Regulation is often blamed for increasing cost, reducing efficiency and generally complicating business relationships – and yet Regulation is often blamed for increasing cost, reducing efficiency and generally complicating business relationships – and yet RISK CONTAGION RISKS CAN EMERGE FROM SECTORS WITH LOWER DUAL TESTING APPROACHES SECTORS THAT HAVE DUAL TESTING 2 When it comes to using, sharing and keeping data, companies need to be certain of two things: The information about individuals and companies has been authenticated as part of KYC and AMLprocedures That they and their third-party suppliers are using the same data sovereignty laws Not all companies in all sectors are checking that their suppliers are using the same identity authentication methods 3 To limit the threat of a data breach, access to confidential information has to be controlled. RISK IF COMPANIES DO NOT HAVE AN IN-HOUSE PROCESS, IT MAY NOT ONLY EXPOSE THEM BUT ALSO THEIR CLIENTS TO UNNECESSARY RISKS RISK BY NOT PARTICIPATING COMPANIES ARE MISSING OUT ON LEARNING WHICH STRATEGIES AND PRACTICES WORK BEST 93% 96% of respondents have taken full steps over the past 12 months to ensure that there are employee access controls to confidential company information/ documentation of respondents have an in-house process to ensure limitations on third-party access to their systems data 4 5 of companies keep a complete inventory of all third-party suppliers that handle employee and customer data 85% of companies do not require third-party suppliers to have procedures in place to handle data breaches 20% Cyber-security information sharing partnerships allow companies to exchange cyber-threat information in a confidential way in real time which helps to increase awareness of risk. of respondents participate in cyber-security information sharing partnerships with other financial institutions of financial institutions participated in these partnerships 70% 78% of respondents say financial regulation definitely has a positive effect when working with third parties said it has a somewhat positive effect 39% RISK THIRD PARTIES THAT DO NOT COMPLY WITH CHANGES IN FINANCIAL REGULATIONS MAY LOSE CUSTOMER LOYALTY AUTHENTICATION EMPLOYEE &THIRD-PARTY ACCESS &TRAINING DATA SECURITY A REGULATORY SURPRISE 44% PENETRATION TESTING The use of simulations to determine what type of damage could result if IT systems are attacked from an internal or external source – is critical for a company’s health. 1 SECURITY TESTING Source: The Economist Intelligence Unit survey, April–May 2017 Copyright: © The Economist Intelligence Unit, 2017