Analysis

Third Party Crasher

Learn how third party breaches can impact investment funds and their portfolio companies, and how to mitigate these risks.

Third Party CrasherThird Party Crasher

We teamed up with The Line, a must-have resource for private capital fund operational professionals, for a joint article detailing the growing risk of third party breaches at both GP and portfolio company levels.

Fund managers dedicate a lot of time, effort, and resources to mitigating cyber attacks at both the GP and portfolio level.  

There are in essence only five ways a company can be targeted by threat actors: Networks; Applications; Physical premises; People; and Suppliers.

The first four methods tend to be well covered, however, suppliers are often overlooked – especially when it comes to managing the cyber threats of portfolio companies.  

Supply chain risk has come into sharp focus in recent months with one GP having to suspend trading in a portfolio company due to a third party attack, while another manager has been forced to write off an investment entirely.

This article, co-authored with The Line, explores why third party attacks are on the rise, details real life case studies, and provides a framework for how to think about third party breaches and therefore how to put the right protections in place.  

You can register (for free) and read the full article on the website of The Line.

Analysis

Download for free

By submitting this form, you agree to Risk Ledger’s Terms of Service, Privacy Policy, and Risk Ledger contacting you.

Thank you!
Download
Oops! Something went wrong while submitting the form.
Analysis

Download for free

Download
Pattern Trapezoid Mesh

Join our growing community

Sign up to our monthly newsletter to receive exclusive research and analyses by our experts, the latest case studies from our clients as well as guides, explainers and more to turn your supply chain risk management programme into a resounding success story.