Boardroom Tool
The Board’s Role in Ransomware Preparedness and Response
Structure oversight of ransomware preparedness and response, by focusing on risk governance, scenario planning, and decision-making under pressure.
Boardroom Tool
Board Oversight of Third-Party & Supply Chain Cyber Risk
This tool, featured in the fifth edition of the NACD-ISA Director's Handbook on Cyber-Risk Oversight, provides questions directors can ask to ensure that key components of third-party and supply chain risk management are being managed effectively.
While third-party technology and services are essential for business, they introduce significant and escalating risks that can impact profitability and reputation.
This threat is accelerating and expanding. According to Verizon’s 2025 Data Breach Investigations Report, compared to 2024 data “the percentage of breaches where a third party was involved doubled, going from 15% to 30%.” Adversaries are increasingly targeting everything from major software vendors to foundational open-source tools, as seen in the 2024 XZ-utils backdoor incident.
A board’s oversight must now extend beyond the company’s walls to its third- and fourth-party dependencies. This expanded responsibility is underscored by new SEC disclosure rules requiring boards to report on their governance of third-party cyber risk.
Objective: Third-party risk is treated as a core enterprise risk, not a siloed issue, with clear accountability.
Objective: A structured process is in place to identify, prioritize, and mitigate risks based on business impact.
Objective: The organization can withstand and recover from a related incident.
Real-World Examples of Third-Party and Supply Chain Security Failures |
||
SnowflakeTimeline: 2024 Description: A cybercrime campaign where attackers used stolen credentials to breach hundreds of company accounts hosted on the Snowflake cloud data platform. The attackers specifically targeted accounts that were not protected with multi-factor authentication (MFA). Lesson: This incident highlights a failure in managing a third-party relationship under the cloud’s shared responsibility model. While the vendor platform was not breached, the customer’s failure to implement basic controls on that platform led to a catastrophic breach. Ensure management is accountable not just for vetting vendors, but for securing the company’s own configurations within those third-party services. |
MOVEitTimeline: 2023-Ongoing Description: A single vulnerability in a popular secure file transfer software product was exploited by a ransomware group, leading to a cascading data breach affecting thousands of organizations globally. Lesson: This is a textbook example of systemic software supply chain risk. A flaw in one widely used tool can create a catastrophic, industry-spanning event, underscoring the need for a robust inventory of sensitive data handled by third-party applications. |
KaseyaTimeline: 2021 Description: A ransomware attack on a major IT management firm’s software product had a cascading impact, disrupting nearly 1,500 downstream businesses. Lesson: This demonstrates immense “concentration risk” in the software supply chain. Question management on dependencies related to widely used software to understand the potential for systemic disruption. |
National Institute of Standards and Technology (NIST) Special Publication 800-161: Cybersecurity Supply Chain Risk Management Practices
This is the foundational US Government framework for C-SCRM. It provides comprehensive guidance to organizations on identifying, assessing, and mitigating supply chain risks.
European Union Agency for Cybersecurity (ENISA) Threat Landscape for Supply Chain Attacks
This report provides a crucial European perspective on the threat landscape. It maps and studies supply chain attacks, analyzes attacker techniques, and offers mitigation recommendations tailored to the EU’s regulatory environment.
This tool, featured in the fifth edition of the NACD-ISA Director's Handbook on Cyber-Risk Oversight, provides questions directors can ask to ensure that key components of third-party and supply chain risk management are being managed effectively.
While third-party technology and services are essential for business, they introduce significant and escalating risks that can impact profitability and reputation.
This threat is accelerating and expanding. According to Verizon’s 2025 Data Breach Investigations Report, compared to 2024 data “the percentage of breaches where a third party was involved doubled, going from 15% to 30%.” Adversaries are increasingly targeting everything from major software vendors to foundational open-source tools, as seen in the 2024 XZ-utils backdoor incident.
A board’s oversight must now extend beyond the company’s walls to its third- and fourth-party dependencies. This expanded responsibility is underscored by new SEC disclosure rules requiring boards to report on their governance of third-party cyber risk.
Objective: Third-party risk is treated as a core enterprise risk, not a siloed issue, with clear accountability.
Objective: A structured process is in place to identify, prioritize, and mitigate risks based on business impact.
Objective: The organization can withstand and recover from a related incident.
Timeline: 2024
Description: A cybercrime campaign where attackers used stolen credentials to breach hundreds of company accounts hosted on the Snowflake cloud data platform. The attackers specifically targeted accounts that were not protected with multi-factor authentication (MFA).
Lesson: This incident highlights a failure in managing a third-party relationship under the cloud’s shared responsibility model. While the vendor platform was not breached, the customer’s failure to implement basic controls on that platform led to a catastrophic breach. Ensure management is accountable not just for vetting vendors, but for securing the company’s own configurations within those third-party services.
Timeline: 2023-Ongoing
Description: A single vulnerability in a popular secure file transfer software product was exploited by a ransomware group, leading to a cascading data breach affecting thousands of organizations globally.
Lesson: This is a textbook example of systemic software supply chain risk. A flaw in one widely used tool can create a catastrophic, industry-spanning event, underscoring the need for a robust inventory of sensitive data handled by third-party applications.
Timeline: 2021
Description: A ransomware attack on a major IT management firm’s software product had a cascading impact, disrupting nearly 1,500 downstream businesses.
Lesson: This demonstrates immense “concentration risk” in the software supply chain. Question management on dependencies related to widely used software to understand the potential for systemic disruption.
National Institute of Standards and Technology (NIST) Special Publication 800-161: Cybersecurity Supply Chain Risk Management Practices
This is the foundational US Government framework for C-SCRM. It provides comprehensive guidance to organizations on identifying, assessing, and mitigating supply chain risks.
European Union Agency for Cybersecurity (ENISA) Threat Landscape for Supply Chain Attacks
This report provides a crucial European perspective on the threat landscape. It maps and studies supply chain attacks, analyzes attacker techniques, and offers mitigation recommendations tailored to the EU’s regulatory environment.
Toolkit For Action
Fifteen specialized tools with best practices that enable boards to address common, board-level cyber-risk oversight issues.
Final Days to Save $1,500
on NACD Directors Summit™
2026 Registration
Register by Thursday, April 30 to take advantage of this exclusive discounted pricing.
October 11-14, 2026
The Gaylord National Harbor | Washington, DC Area