Brooklyn solutions logo
  • Products
    • Brooklyn Contract and Performance
    • Brooklyn Relationship
    • Brooklyn Risk
    • Brooklyn ESGA+
    • E-Meet “Digitised Vendor Tail”
  • Services
    • Fully-managed VendorOps Powered Vendor Management Office
    • Data Enrichment
    • Due Diligence / Risk Assessment & Periodic Refresh
    • Contract Compliance & Key Term Extraction
    • Renewal Management and Workload Planning
    • Custom Dashboards and Surveys
    • Vendor Tail Management Services
    • Vendor Management Maturity Benchmarking
    • VendorOps Trusted Advisor
  • Use Cases
    • EBA Outsourcing
    • EIOPA Outsourcing
    • PRA Outsourcing
    • Same Day On-Boarding
  • Company
    • About us
    • Meet The Team
    • Careers
  • Resources
    • Company News
    • Case Studies
    • Governance
    • Productivity
    • Strategy
    • Templates & Toolkits
    • Webinars
    • Whitepapers
  • Contact
Community Forum Get Started
Brooklyn solutions logo
Get Started
  • Products
    • Brooklyn Contract and Performance
    • Brooklyn Relationship
    • Brooklyn Risk
    • Brooklyn ESGA+
    • E-Meet “Digitised Vendor Tail”
  • Services
    • Fully-managed VendorOps Powered Vendor Management Office
    • Data Enrichment
    • Due Diligence / Risk Assessment & Periodic Refresh
    • Contract Compliance & Key Term Extraction
    • Renewal Management and Workload Planning
    • Custom Dashboards and Surveys
    • Vendor Tail Management Services
    • Vendor Management Maturity Benchmarking
    • VendorOps Trusted Advisor
  • Use Cases
    • EBA Outsourcing
    • EIOPA Outsourcing
    • PRA Outsourcing
    • Same Day On-Boarding
  • Company
    • About us
    • Meet The Team
    • Careers
  • Resources
    • Company News
    • Case Studies
    • Governance
    • Productivity
    • Strategy
    • Templates & Toolkits
    • Webinars
    • Whitepapers
  • Contact
Community Forum
Solutions

Log4J: Reducing risk against cybersecurity threats to the supply chain

June 16, 2022 Strategy Lily Poelmann

Log4J: Reducing risk against cybersecurity threats to the supply chain

Share this article:
Log4J: Reducing risk against cybersecurity threats to the supply chain thumbnail
Welcome to Brooklyn Solutions
In order to ensure we provide you with the most relevant content we need to confirm who you may be visiting as.
I am a Buyer
I am a Seller
Unsure of which profile you are?
Unsure of which profile you are?
A Buyer is the contractor or vendor that provides a service to a business.
A Seller brings contractors and vendors in to a business to deliver a service.

Download the pdf overview 

The highest number of supply chain attacks of 2021 took place in December, with one of the most detrimental being the Log4j vulnerability. Commonly used by apps and services across the internet, Log4j is an open-sourced logging library within a development language called Java. The vulnerability meant those threat actors had the ability to remote execute code and take control of anything that was making use of its components. The attack required very little expertise to execute, making Log4j one of the most severe vulnerabilities seen in recent years. Left unresolved, attackers could break into systems, steal sensitive data and infect networks with malicious software. A significant danger of these attacks was their ability to go undetected for months. Consequences for an organisation or it’s third-parties suffering an attack would range from operational delays to corporate or government surveillance, including the potential loss of data. Companies across most industries had to undergo a number of processes in order to assess whether any of their systems were vulnerable. They had begun by checking whether their own systems use Java, and if so, whether these systems were internet-facing, which would make them more accessible to exploitation. After this activity commenced a mass- coordination event in which organizations were advised to contact all of their suppliers to assess their vulnerability. At Brooklyn Vendor Assurance, most of our clients have thousands of suppliers whom they had to rapidly assess on scale and on mass.

 

The Solution: Brooklyn’s step-by-step process

One of our clients, a major retail firm, was made aware of Log4j and its potential risk to hundreds of suppliers. Using Brooklyn Vendor Assurance, this client rapidly remediated risk from the Log4j vulnerabilities for the wider vendor tail, where it’s suggested that over 60% of technology suppliers use Log4j as an indirect dependency. The Brooklyn platform fast-tracked a vendor consolidation exercise that would have usually required vendor managers to separately contact each supplier, as well as follow up on their individual responses. For our clients that were vulnerable to the cyberthreat, Brooklyn executed the following:

(1) Bespoke Cyberthreat survey template for Log4j, (2) Implemented a deadline & automated reminders, (3) Identified survey recipients, (4) Risk record created from negative responses, (5) Progress tracked by survey report.

Rapid Scalability
Gathered intel on the customer’s suppliers and the measures they have taken against the vulnerability, mitigating potential risk to the supplier’s ability to provide their services securely.

Auto-generated Risk Tracking
Our platform digitized and scaled response versus action by dividing auto-generated risk tracking, based on the responses from over 90 key suppliers. Vendors reported at risk were tracked and set-up with automated cadence.

Fit-For-Audit
Brooklyn ensured that our clients were digitally “Fit-For- Audit” by timestamping vendor submissions, in turn driving best practices of digital collaboration and customer-supplier transparency.

 

Outcomes

All suppliers managed by Brooklyn have up-to-date contact details that are periodically validated. With this built-in functionality as well as Brooklyn’s E-Meet Capability, our client successfully determined that none of its systems nor its 3rd parties’ had been exploited by the Log4j vulnerability.

The Future of Cybersecurity Threats

Despite the events of Log4j having occurred 6 months ago, experts warn that it remains a serious threat. A new report by Rezilion has revealed that even at the end of April, almost 40% are still downloading vulnerable versions of the Log4j library. Even more troubling is that 60% of 17,840 open-source packages that use Log4j are still vulnerable and are yet to upgrade to the fixed version. Unfortunately, vulnerability exploitations of the supply chain will only continue to increase since the Log4j event. Threat actors have advanced their tactics, as they now lay low within networks that they have broken into, waiting for the opportunity to target high-value data. It remains essential that businesses build defences against future attacks by establishing risk management at an early stage. Businesses cannot afford to simply assume that their web servers are safe. With Brooklyn’s automated e-meet capabilities, businesses can convert their post-breach strategy into a continuous identification of risk amongst third parties.

Get in touch

Do you want to protect your organisation from future cybersecurity threats? Request a demo, or get in touch:

+44 (0) 207 101 4911 | info@brooklynva.com | LinkedIn

Share this article:
Related Articles
Make Action Tracking A Core Process Of Your VMO
November 2, 2022
Strategy
Make Obligation Management A Core Process Of Your VMO
October 20, 2022
Strategy

Build A Successful Enterprise Vendor Management Function

Book a demo today or contact our sales team
Get Started Contact Sales
Get the latest from Brooklyn Solutions in your inbox
A monthly digest of the latest news and insights from Brooklyn Solutions
Brooklyn Solutions logo
Products
Brooklyn Relationship Brooklyn Contract Brooklyn Risk Brooklyn Esga+ Emeet (Digitalised vendor tail)
Resources
News Events
Company
Team Careers About Us
© Brooklyn Solutions Privacy Policy
Designed & Built by Creo