Brooklyn solutions logo
  • Products
    • Contract Lifecycle Management
    • Customer-Supplier Relationship Management
    • Third Party Risk Management
    • DORA Regulations
    • Governance, Risk & Compliance (GRC)
    • Brooklyn ESGa+
    • Digital Assessment Frameworks
    • Integrations
  • Use Cases
    • Onboarding & Segmentation
    • Policy, Governance & Workload Orchestration
    • Performance, Scorecards & Reporting
    • SLA & KPI Processing
    • Contract & Obligation Management
    • Innovation, Issues, Change & Dispute Management
    • Structured Reviews & Action Tracking
    • Operational Risk Capture, Mitigation & Controls
    • Third Party Risk Management
    • Meeting Regulatory Compliance
    • Environmental, Social and Governance
    • Contract Assessments
  • Services
    • Services for Success
    • Professional Services
    • Rapid Start Programme
  • Resources
    • News & Insights
    • Resource Library
    • Upcoming Events
  • Company
    • About us
    • Partners
    • Meet The Team
    • Careers
Rapid Start Programme Get Started
Brooklyn solutions logo
Rapid Start Programme Get Started
  • Products
    • Contract Lifecycle Management
    • Customer-Supplier Relationship Management
    • Third Party Risk Management
    • DORA Regulations
    • Governance, Risk & Compliance (GRC)
    • Brooklyn ESGa+
    • Digital Assessment Frameworks
    • Integrations
  • Use Cases
    • Onboarding & Segmentation
    • Policy, Governance & Workload Orchestration
    • Performance, Scorecards & Reporting
    • SLA & KPI Processing
    • Contract & Obligation Management
    • Innovation, Issues, Change & Dispute Management
    • Structured Reviews & Action Tracking
    • Operational Risk Capture, Mitigation & Controls
    • Third Party Risk Management
    • Meeting Regulatory Compliance
    • Environmental, Social and Governance
    • Contract Assessments
  • Services
    • Services for Success
    • Professional Services
    • Rapid Start Programme
  • Resources
    • News & Insights
    • Resource Library
    • Upcoming Events
  • Company
    • About us
    • Partners
    • Meet The Team
    • Careers
Solutions

Log4J: Reducing risk against cybersecurity threats to the supply chain

June 16, 2022 Strategy Emily Devereux

Log4J: Reducing risk against cybersecurity threats to the supply chain

Share this article:
Log4J: Reducing risk against cybersecurity threats to the supply chain thumbnail

Download the pdf overview 

The highest number of supply chain attacks of 2021 took place in December, with one of the most detrimental being the Log4j vulnerability. Commonly used by apps and services across the internet, Log4j is an open-sourced logging library within a development language called Java. The vulnerability meant those threat actors had the ability to remote execute code and take control of anything that was making use of its components. The attack required very little expertise to execute, making Log4j one of the most severe vulnerabilities seen in recent years. Left unresolved, attackers could break into systems, steal sensitive data and infect networks with malicious software. A significant danger of these attacks was their ability to go undetected for months. Consequences for an organisation or it’s third-parties suffering an attack would range from operational delays to corporate or government surveillance, including the potential loss of data. Companies across most industries had to undergo a number of processes in order to assess whether any of their systems were vulnerable. They had begun by checking whether their own systems use Java, and if so, whether these systems were internet-facing, which would make them more accessible to exploitation. After this activity commenced a mass- coordination event in which organizations were advised to contact all of their suppliers to assess their vulnerability. At Brooklyn Vendor Assurance, most of our clients have thousands of suppliers whom they had to rapidly assess on scale and on mass.

 

The Solution: Brooklyn’s step-by-step process

One of our clients, a major retail firm, was made aware of Log4j and its potential risk to hundreds of suppliers. Using Brooklyn Vendor Assurance, this client rapidly remediated risk from the Log4j vulnerabilities for the wider vendor tail, where it’s suggested that over 60% of technology suppliers use Log4j as an indirect dependency. The Brooklyn platform fast-tracked a vendor consolidation exercise that would have usually required vendor managers to separately contact each supplier, as well as follow up on their individual responses. For our clients that were vulnerable to the cyberthreat, Brooklyn executed the following:

(1) Bespoke Cyberthreat survey template for Log4j, (2) Implemented a deadline & automated reminders, (3) Identified survey recipients, (4) Risk record created from negative responses, (5) Progress tracked by survey report.

Rapid Scalability
Gathered intel on the customer’s suppliers and the measures they have taken against the vulnerability, mitigating potential risk to the supplier’s ability to provide their services securely.

Auto-generated Risk Tracking
Our platform digitized and scaled response versus action by dividing auto-generated risk tracking, based on the responses from over 90 key suppliers. Vendors reported at risk were tracked and set-up with automated cadence.

Fit-For-Audit
Brooklyn ensured that our clients were digitally “Fit-For- Audit” by timestamping vendor submissions, in turn driving best practices of digital collaboration and customer-supplier transparency.

 

Outcomes

All suppliers managed by Brooklyn have up-to-date contact details that are periodically validated. With this built-in functionality as well as Brooklyn’s E-Meet Capability, our client successfully determined that none of its systems nor its 3rd parties’ had been exploited by the Log4j vulnerability.

The Future of Cybersecurity Threats

Despite the events of Log4j having occurred 6 months ago, experts warn that it remains a serious threat. A new report by Rezilion has revealed that even at the end of April, almost 40% are still downloading vulnerable versions of the Log4j library. Even more troubling is that 60% of 17,840 open-source packages that use Log4j are still vulnerable and are yet to upgrade to the fixed version. Unfortunately, vulnerability exploitations of the supply chain will only continue to increase since the Log4j event. Threat actors have advanced their tactics, as they now lay low within networks that they have broken into, waiting for the opportunity to target high-value data. It remains essential that businesses build defences against future attacks by establishing risk management at an early stage. Businesses cannot afford to simply assume that their web servers are safe. With Brooklyn’s automated e-meet capabilities, businesses can convert their post-breach strategy into a continuous identification of risk amongst third parties.

Get in touch

Do you want to protect your organisation from future cybersecurity threats? Request a demo, or get in touch:

+44 (0) 207 101 4911 | info@brooklynva.com | LinkedIn

Share this article:
Related Articles
The Great U.S Tariff Shock: Navigating the New Trade Landscape
April 22, 2025
Compliance Strategy TPRM
Are Vendor Dashboards a Game Changer for SRM Teams?
November 5, 2024
Productivity Strategy

Deal Signed. Time to Deliver.

Book a demo today
Get Started Contact Sales
Get the latest from Brooklyn Solutions in your inbox
A monthly digest of the latest news and insights from Brooklyn Solutions
Brooklyn Solutions logo
Solutions
Customer-Supplier Relationship Management Contract Lifecycle Management Third Party Risk Management Governance, Risk & Compliance (GRC)
Services
Professional Services Services for Success Rapid Start Programme Integrations
Company
About Us Partners Team ESG Rating
© Brooklyn Solutions Privacy Policy
Designed & Built by Creo