Vendor Cyber Risk Is Your Biggest Compliance Hole: And You're Mispricing It
Brian's Banking Blog
Vendor Cyber Risk Is Your Biggest Compliance Hole: And You're Mispricing It
Your bank depends on approximately 80-120 critical vendors for core operations: payment processing, core banking, compliance tools, liquidity management, loan origination, and deposit operations.
At least 15-20 of these vendors are "critical path" — meaning if they go down, your bank's operations cease within hours.
And your vendor risk management is likely inadequate.
The Systemic Risk (Why Regulators Care Now)
The 2020 SolarWinds breach is the template for what can happen:
Timeline: - December 2019: Attackers compromised SolarWinds' build environment - February 2020: Trojanized software pushed to 18,000+ customers - December 2020: Discovery (10 months after initial compromise) - January 2021: Emergency patches - February-March 2021: Recovery and remediation
Impact: - 18,000 organizations affected (government agencies, corporate IT, cloud providers) - Zero-day vulnerability (undetectable for 10 months) - Lateral movement enabled inside compromised networks - Supply chain trust destroyed
For banking: Imagine if Jack Henry (which serves 8,500+ community banks) was compromised in the same way.
Timeline: - Month 1: Attackers inside Jack Henry network - Months 2-10: Silent lateral movement, privilege escalation - Month 11: Initial detection (if you're lucky) - Month 12: Incident confirmed, emergency patches released - Months 13-24: Remediation across 8,500 banks
Impact: - Every community bank using Jack Henry is potentially compromised - Payment processing, deposit operations, loan servicing all affected - 2 weeks of recovery time minimum across industry - $50B+ in losses (frozen deposits, disrupted lending, customer attrition) - Systemic financial system shock
This isn't speculative. It's a known attack pattern. And banking's dependence on a few critical vendors means it's a matter of when, not if.
Why Your Vendor Risk Assessment Is Incomplete
Most banks have vendor risk programs that include: - Annual questionnaires (self-assessment) - SOC 2 Type II audits (annual or biennial) - Periodic security assessments - Third-party risk rating services
All useful. All insufficient.
Problem #1: Concentration on a few vendors
Your bank probably has: - 1 core processing vendor (Jack Henry, FIS, Fiserv, or Temenos) - 1-2 payment processors (the same companies) - 1-3 liquidity/treasury management vendors - 1-2 compliance tool providers - 5-10 smaller critical vendors
If any single vendor fails, your operations fail. You have no redundancy. Your incident response plan assumes you can recover independently. You can't.
Example: Jack Henry processes 8,500+ banks. If Jack Henry is compromised, the regulatory response will be: 1. Identify affected institutions 2. Work with Jack Henry on remediation 3. Coordinate across 8,500 banks simultaneously (impossible to do well) 4. Roll out patches and workarounds 5. Recover data and operations
This takes weeks minimum. During that time, your bank is partially operational at best.
Problem #2: Vendor relationships are asymmetric
Vendors (especially large ones) have significant power: - You can't replace them quickly (migration takes 18-36 months) - They control the terms of security assessments (self-reported metrics) - They don't disclose security incidents proactively (you find out from news) - They have legal liability shields (limited liability clauses in contracts)
Your leverage: You can threat to switch vendors (5-10 year lead time required).
That's not leverage. That's a hostage situation.
Problem #3: You're not stress-testing vendor failure
Your incident response plan probably assumes: - Vendor failure is isolated (only affects your bank's processing of that function) - Vendor can recover systems within 24-48 hours - Data integrity is maintained - Customer impact is minimal
None of these are realistic if a major vendor is breached.
A realistic scenario: - Vendor is compromised; malware allows data exfiltration - You discover this from a third-party disclosure (news, threat intel, customer complaint) - Vendor's systems are shut down for forensics - Recovery takes 48-72 hours minimum - Data integrity is questionable (encrypted backups may be compromised too) - Customer impact is severe (deposits aren't accessible, transfers fail, loan approvals delayed)
The Actual Cyber Risk (What Regulators Are Seeing)
Regulators have begun treating vendor cyber risk as systemic. Recent signals:
1. OCC issued guidance (2023) on third-party relationships - Banks must assess third-party cyber capabilities - Banks must have incident response plans for third-party failures - Banks must conduct periodic security assessments - Banks must establish service-level agreements with security requirements
2. Federal Reserve is watching vendor concentration - Payment processor concentration (3 firms: FIS, Fiserv, Jack Henry) - Core processing concentration (same 3 firms) - Treasury/liquidity concentration (smaller set)
3. FDIC is documenting vendor-related failures - Several recent bank failures were partially caused by vendor system failures - Regulators are asking: "Why did the bank have no contingency plan?"
4. New frameworks emerging - "Third-party risk" is now a standard exam finding - "Vendor concentration risk" is flagged during capital stress tests - "Business continuity planning" now includes vendor failure scenarios
What You Should Actually Do
Phase 1: Inventory and Assess (Months 1-3)
- Map critical vendors explicitly. - Which vendors can take your bank down if they fail for 1 hour? 4 hours? 24 hours? - What's the recovery time objective (RTO) for each critical vendor? - What's the recovery point objective (RPO) for data?
Example critical vendors: - Core processor (RTO: 4 hours; RPO: < 1 hour) - Payment processor (RTO: 1 hour; RPO: < 15 minutes) - Liquidity management (RTO: 4 hours; RPO: < 1 hour) - Compliance tools (RTO: 24 hours; RPO: flexible)
-
Assess actual cyber maturity of critical vendors. - Don't rely on SOC 2 reports (self-reported and outdated) - Conduct incident response walkthroughs (how would they actually respond?) - Review their incident history (what failures have they had?) - Assess their threat intelligence capabilities (do they know about emerging threats?)
-
Quantify concentration risk. - What % of your critical functions depend on single vendors? - What % of your transaction volume flows through shared processors? - If your top 3 vendors went down simultaneously, what's your impact?
Phase 2: Stress-Test and Plan (Months 3-6)
- Run vendor failure scenarios. - Scenario A: Core processor down for 24 hours (degraded mode operations) - Scenario B: Payment processor down for 4 hours (customer-facing impact) - Scenario C: Liquidity vendor down for 8 hours (treasury operations disrupted) - Scenario D: Multiple vendors compromised simultaneously (worst case)
For each scenario: - What customer-facing services are affected? - How do you notify customers? - What workarounds do you deploy? - How long until normal operations? - What's the estimated loss (customer attrition, regulatory fines, data breach costs)?
-
Build vendor-specific incident response plans. - Who's the primary contact at the vendor? - What's their escalation path? - What's your communication plan to customers? - What's your backup vendor or manual process? - What's your data recovery approach?
-
Establish service-level agreements (SLAs) with teeth. - Require the vendor to maintain cyber insurance ($100M+ for large vendors) - Require the vendor to meet specific security standards (NIST, ISO 27001) - Require the vendor to disclose security incidents to you within 2 hours - Include penalties for SLA violations (liquidated damages, contract termination) - Require the vendor to participate in annual incident response drills
Phase 3: Diversify and Harden (Months 6-12)
- Reduce concentration risk. - Is there a second vendor for your critical functions? - Can you split critical processing across 2 vendors? - For new systems, mandate dual-vendor redundancy?
Cost: 10-15% premium. Value: Survival during vendor outages.
- Build internal contingency capabilities. - Can your ops team manually process loans if the loan system fails? - Can you settle payments through alternate channels if primary processor fails? - Do you have backup data feeds from alternate sources?
Example: If your payment processor fails, can you route payments through Fed wire, ACH, or another processor for 24 hours? If no, you need to build this capability.
- Implement continuous monitoring. - Subscribe to threat intelligence on your critical vendors - Monitor vendor security announcements - Track industry breaches at similar firms - Join vendor-specific information sharing groups
Phase 4: Governance and Testing (Ongoing)
-
Quarterly vendor reviews: - Any security incidents or breaches? - Any SLA violations? - Any system performance degradation? - Any staffing changes at the vendor?
-
Annual incident response drills: - Assume critical vendor is down - Execute your contingency plan - Measure recovery time - Identify gaps - Update plans
-
Board-level reporting: - Quarterly: Vendor incidents and SLA compliance - Annually: Concentration risk and disaster recovery testing results - As-needed: Material vendor security concerns
The Real Cost
Most banks budget $200-400K annually for third-party risk management. This usually covers: - Questionnaire management software - One contractor for assessments - Incident response plan on the shelf (not tested)
This is inadequate for the actual risk.
A proper vendor cyber risk program costs: - Personnel: $500K-1M annually (dedicated risk officer + team) - Tools and assessments: $200-400K annually - Contingency infrastructure: $300-600K annually - Testing and drills: $100-200K annually - Total: $1.1M-2.2M annually
For a $10B bank with $80-100M in annual profit, that's 1.1-2.2% of profit allocated to vendor cyber risk.
That seems expensive. Until a vendor breach costs you $50M in losses, customer attrition, and regulatory fines. Then it seems cheap.
What This Means for Your Board
Add to Q2 agenda:
-
Approve expanded third-party risk program. - Budget $1-2M annually for vendor cyber risk management - Appoint a dedicated third-party risk officer (new role if necessary) - Establish quarterly board reporting
-
Commission a vendor concentration analysis. - Which vendors can take us down? - How quickly can we recover? - What redundancy exists? - What gaps need to be filled?
-
Stress-test critical vendor failures. - Scenario: Core processor down for 48 hours - Scenario: Payment processor compromised - Scenario: Multiple vendors affected simultaneously
-
Negotiate new SLAs with critical vendors. - Require cyber insurance - Require incident notification within 2 hours - Require participation in annual drills - Build in liquidated damages for breaches
Vendor cyber risk is your biggest operational blind spot. Fixing it is harder than fixing technology or compliance. But it's also more critical.
Start now.