🔐

Governance in Third-Party Cybersecurity Management

Apr 5, 2025

Webinar on Governance Policies and Procedures for Third-Party Cyber Security Risk Management

Introduction

  • This is the seventh webinar in a 10-part series on cybercity and digitalization, focusing on supply chain cybersecurity in the energy sector.
  • The webinar is organized by US Energy Association's AMP UP program, funded by USAID.
  • The series aims to discuss cybersecurity challenges in the energy sector amidst various transformations like integration of renewables, deployment of grid-edge technologies, etc.

Key Speakers

  • Terry Khil: Senior Consultant at Amper Industrial Security and founder of Cyber Kaleidoscope LLC.
  • Roland Miller III: Ambassador for Cyber Florida, with extensive experience in securing national critical infrastructure.

Objectives of the Webinar

  • Focus on governance policies, procedures, and best practices for third-party risk management.
  • Discuss organizational aspects and models for cybersecurity management.
  • Explore strategies for communication within organizations and with regulatory authorities.
  • Highlight the importance of cyber investments in capital and operational maintenance expenses.

Governance and Best Practices

  • Establish a governance framework with executive sponsorship, a director-level steering committee, and a working group of subject matter experts.
  • Develop a charter outlining responsibilities, scope, and objectives.
  • Implement a risk assessment process to identify and manage risks associated with third-party vendors.

Challenges and Solutions

  • Procurement Issues: Lack of centralized procurement can hinder third-party risk management. Ensure all purchases, including via credit cards or P-cards, go through a rigorous review process.
  • Cultural Alignment: Match cybersecurity initiatives with organizational culture to avoid resistance.
  • Third-Party Inclusion: Include third parties in discussions as stakeholders for better feedback and process improvement.
  • Executive Buy-In: Communicate the business impact and costs of cybersecurity risks to gain executive support.

Organizational Change Management

  • Use models like ADKAR to manage change through awareness, desire, knowledge, ability, and reinforcement.
  • Regularly review and update policies and procedures.
  • Engage key influencers in the company to foster a culture of security compliance.

Risk Management and Exceptions

  • Establish a process for handling deviations from policies and standards with a clear risk register.
  • Ensure communication of risks to relevant stakeholders for informed decision-making.

Funding and Sustainability

  • Justify cybersecurity investments with clear business value and potential risks of inaction.
  • Plan for ongoing operational costs and headcount needs for sustained risk management.

Importance of Compliance and Security Culture

  • Develop a culture of compliance and security across the organization.
  • Regularly assess policies to ensure they are effective and align with business objectives.

Conclusion

  • Emphasize the need for a solid foundation in policy management and exception handling.
  • Encourage ongoing learning and adaptation in cybersecurity practices.

Q&A Highlights

  • Importance of mock audits and self-assessments to evaluate policy effectiveness.
  • Use of surveys to gauge organizational change management success.
  • Addressing IT and OT convergence for better security alignment.
  • Managing policies to avoid unintended consequences and maintain flexibility.

Next Steps

  • The next webinar in the series will focus on managing cybersecurity risks in a rapidly expanding electric grid, scheduled for April 11th.