3 résultats
pour « third-party cyber risk »
The ESAs DORA guide explains the framework's objectives, principles, structure, activities, processes, and expected outcomes. It covers CTPP designation based on criticality, risk assessment, and detailed oversight activities including ongoing monitoring, requests for information, general investigations, and inspections. The document also outlines the issuance of non-binding recommendations for identified deficiencies and subsequent follow-up procedures to ensure compliance, ultimately aiming to enhance digital operational resilience and financial system stability across the EU.
Financial institutions are increasingly dependent on third-party service providers (TPSPs), raising concerns about systemic risks due to limited transparency. While the EU and U.K. have introduced formal oversight regimes, the U.S. relies on industry cooperation and micro-prudential supervision. A recent case study highlights financial stability risks from a payments disruption linked to a TPSP. As rapid technological change reshapes the financial sector, vulnerabilities from TPSP concentration and interconnectedness may grow. Greater understanding is needed to assess these risks and inform potential oversight responses.
Managing cyber risk in the supply chain is a major challenge in cybersecurity. Organizations struggle to evaluate suppliers' security postures, while suppliers face challenges in communicating these postures. This study, using interviews and surveys, formulates a process theory for supplier cyber risk assessment, highlighting the importance of secure technology. The findings provide actionable insights for improving supply chain cyber risk management.