{{item.title}}
{{item.text}}
{{item.title}}
{{item.text}}
In recent years, regulatory authorities have increasingly called upon financial institutions to strengthen cyber risk management for their supply chains, resulting in a need for both Japanese financial institutions and their subcontractors to update their risk management measures. A failure to sufficiently address supply chain cyber risk management could lead not only to impacts like information leaks and system outages, but also to medium- to long-term business impacts including damage to an institution’s reputation and customer loyalty.
However, many security officers of financial institutions have concerns regarding issues such as the extent to which they can require subcontractors with whom their institution has no capital relationship to implement management measures and what kind of measures they need to take to implement efficient and effective management. To help those responsible for security at Japanese financial institutions obtain hints on how to address such issues, PwC Consulting LLC conducted interviews with experts at overseas financial institutions regarding their own past successes.
This report is intended for those responsible for cybersecurity at Japanese financial institutions. It presents examples of advanced initiatives taken overseas with regard to supply chain cyber risk management and compiles recommendations for actions to be taken by Japanese financial institutions in the near future.
We conducted interviews with experts at overseas financial institutions that are pursuing advanced initiatives in supply chain cybersecurity, and arrived at the following recommendations for each phase of the process, which can also be adopted by Japanese corporations.
Phase |
Recommendations |
Security risk assessment: Contractor/service selection phase |
|
Security risk assessment: Contracting phase |
|
Security risk management at subcontractors’ |
|
Software management |
|
Hardware management |
|
Reporting to senior management |
|
In recent years, both damage caused by cyberattacks that exploit supply chains and concern about such attacks are on the rise. Rather than directly targeting institutions, these attacks target affiliated organisations whose security is comparatively weak, and use those systems as a springboard to attack the suppliers and users of widely-used hardware, software and services.
In ‘10 Major Security Threats’, a document compiled by the Information-Technology Promotion Agency (IPA), Japan, the category ‘Attacks Exploiting Supply Chain Weaknesses’ is rising in rank, from third in 2022 to second in 2023. Potential cyber risks and their anticipated entry points are shown below.
Entry point |
Examples of anticipated cyber risks |
Subcontractor |
|
Supplier (of hardware or software) |
|
Service provider |
|
Open source software |
|
In this study, we examined initiatives aimed at countering cybersecurity risks at primary entry points (third parties) as well as at fourth and subsequent parties, based on the anticipated supply chain patterns shown in the following figure. The targets of this study were experts engaged in cybersecurity initiatives at financial institutions.
Please download the PDF from the following download form to view the latest trends in supply chain cybersecurity risk management in overseas financial institutions.
What are supply chain cyber risks?
Scope of this study
G7
Europe
US
UK
Singapore
Security risk assessment: Selection phase
Security risk assessment: Contracting phase
Risk management at subcontractors
Software management
Hardware management
Reporting to senior management
Matters to note when entering into agreements
Mitsuhiko Maruyama
Partner, PwC Consulting LLC
Kenji Uesugi
Director, PwC Consulting LLC
Yoshimasa Kobayashi
Partner, PricewaterhouseCoopers Japan LLC
Anjali Mahalle
Senior Associate, PwC Consulting LLC
Masako Someya
Senior Associate, PwC Consulting LLC
Yudai Kitano
Associate, PwC Consulting LLC