Why Your Public Partners Care About Your Cybersecurity Approach

By Kavitha Mariappan and Bill Choi


Third-Party Cyber Risk Private Company Governance Online Article

While the connection between cybersecurity, environmental, social, and governance (ESG) issues, and private companies may not be immediately obvious, they influence one another in significant if sometimes subtle ways. Much like how awareness of carbon emissions and climate change has become mainstream, cybersecurity has risen to the top of the ESG agenda and is often included in how companies are evaluated as business partners, suppliers, and as targets for acquisition.

Cybersecurity risk can be as harmful to a company’s reputation as other ESG risks for companies across all sectors. Regardless of your stance on ESG, the practice of managing risk across a set of priority factors that matter to your stakeholders is here to stay.

Establishing and demonstrating a mature cybersecurity posture helps private companies manage and mitigate risk, efforts publicly listed counterparts are required to report in light of recently released US Securities and Exchange Commission (SEC) cybersecurity regulations. This is especially true following recent, high-profile supply chain attacks enabled by compromised vendors.

As a result, cybersecurity is often included in ESG evaluations and robust, well-documented practices can indicate strong risk management. Furthermore, with the right tools, shoring up your cybersecurity can effectively demonstrate ESG progress.

Cybersecurity Impacts Extend Beyond Your Own Operations

In the same way that geopolitical, macroeconomic, environmental, and governance risks threaten business success, adverse cyber events such as breaches and data loss can result in significant financial impact, reputational damage, loss of customer trust, intellectual property theft, and more. 

In today’s digital world, cybersecurity breaches and data loss can impact not only individual businesses but also business partners and customers. Cybersecurity issues can potentially impact broader business ecosystems by allowing reconnaissance, intellectual property theft, and extortion against high-value partners in the supply chain.

Private companies’ vulnerabilities can also be weaponized to endanger their customers and partners. For instance, by stealthily compromising the software vendor SolarWinds, a Russian hacking group was able to insert itself into a software update and remain undetected while surveilling thousands of the vendors’ customers. These types of attacks present a significant threat since they exploit third-party vulnerabilities outside of an organization’s direct control and both public and private companies are susceptible to them. 

Similar to the way companies are cascading environmental and social requirements to their suppliers and business partners, we should expect similar, cyber-related requests to funnel down to prospective partners. Demonstrating strong cybersecurity practices, including explicit disclosure of cybersecurity controls to protect partner data, will be the preferred norm.

All companies, public and private, must be wary of doing business with companies that don’t take cybersecurity seriously in their supply chains. Due diligence is required for data governance, risk assessment, cyber certifications, and the auditing of controls.

Why Businesses Insist on Zero Trust

How can privately held organizations best satisfy the cybersecurity criteria of would-be public partners? By staying on top of advancing cybersecurity best practices. 

Research suggests that 90 percent of organizations are concerned that network access provided to third parties could unknowingly serve as a backdoor for attackers. While you cannot trust another organization's cyber risk posture, you can limit the access vendors have to your infrastructure. By controlling vendors’ access to your information and systems, you can prevent bad actors from infiltrating your organization through third parties. This concept is a foundational aspect of a zero-trust strategy.

Zero trust as a strategy rejects the “implicitly trusting” model advanced by previous cybersecurity practices in favor of a “never trust, always verify” approach. In addition to verifying the user's identity, it considers what information they are trying to access and allows this access based on the principle of least privilege (giving access only to what is necessary). 

This approach is far better suited to achieving positive cybersecurity outcomes, including preventing breaches, limiting their damage should one occur, providing secure access to private or public third-party partners, and more. It is also gaining significant traction among both public and private companies.

According to one Zscaler study, more than 90 percent of organizations migrating to the cloud have implemented or are in the process of implementing a zero trust security strategy within the year. The federal government has endorsed the strategy by mandating that agencies adopt zero trust by 2024.

This is because zero trust security represents the most mature approach to cyber-risk oversight available today. Rather than a single solution or solution set, zero trust is an approach to security focused on addressing the most common steps in a security breach: target discovery, initial compromise, lateral movement, and data theft. 

Private boards, regardless of their strategic aims—whether preparing for a merger, an acquisition, or an initial public offering; seeking partnerships with public companies; or shoring up their own security—would do well to align their cybersecurity oversight regimens with this significant overhaul of cybersecurity best practices. In doing so, they can achieve the twin benefits of enhancing their ESG profiles and better managing cyber risk.

Zscaler is a NACD partner, providing directors with critical and timely information, and perspectives. Zscaler is a financial supporter of the NACD.

Kavitha Mariappan
Kavitha Mariappan is a seasoned go-to-market executive with a penchant for rapidly translating technology into customer-centric value, mobilizing global teams and operations, and transforming them into high-growth businesses. Over her more than 20 year tenure spanning enterprise software and service provider, she has held various high-impact roles spanning marketing, product management, and engineering at industry-leading companies, including Databricks, Riverbed, Cisco, and Philips Electronics. Prior to joining Zscaler, she served as chief marketing officer at Split Software, a venture-backed startup where she built the company's go-to-market engine from the ground up and was instrumental in defining a new category for product decisions. Kavitha is responsible for driving global transformation and innovation across all facets of Zscaler’s business, customers, strategy, products, and operations, with a strong focus on customer value creation. Kavitha holds a Bachelor of Engineering in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and a Master of Science in Cybersecurity Risk and Strategy from New York University School of Law and Tandon School of Engineering.

Bill Choi headshot

Bill Choi is senior vice president, strategic finance and investor relations at Zscaler. He is an executive with 25 years of progressive leadership experience encompassing a unique background in corporate finance and capital markets. He drives value and impact by leading investor relations, ESG, long-range planning, and M&A finance initiatives at Zscaler, which contributed to the company's rapid growth from $150 million in annual recurring revenue to over $2 billion and its inclusion in the Nasdaq 100 index within four years of its successful initial public offering. He also serves as a member of the Talent Development Advisory Council, guiding resources for Zscaler’s people leaders to engage, grow, and retain top talent. Prior to moving to Zscaler, Bill spent two decades on Wall Street leading and building technology sector practices. As managing director in equity research, he focused on thought-leadership research and advisory across high-growth companies in cybersecurity, networking, and infrastructure software industries.