top of page

Third-Party Governance:Digital Identity

  • ICIT Research
  • Oct 7, 2024
  • 1 min read

By Jim Routh

Fellow, Institute for Critical Infrastructure Technology


The transition to hybrid work models has significantly increased security challenges for organizations, as employees and third parties access company resources from various remote locations. This expanded attack surface has made it difficult for enterprises to maintain consistent cybersecurity controls, leading to a rise in cyber incidents and supply chain disruptions. The shift, accelerated by the COVID-19 pandemic, has resulted in a persistent trend towards remote and hybrid work, necessitating new strategies for effective risk management. Organizations are struggling to enforce security policies outside of traditional office environments, particularly concerning identity and access management, which is further complicated by the use of unsecured home networks and personal devices.


To address these challenges, there is a pressing need for the evolution of third-party governance practices and cybersecurity controls. Traditional methods, such as annual vendor risk assessments, are increasingly inadequate in managing the dynamic risks associated with modern technology use. Instead, a real-time, data-driven approach that leverages continuous authentication and identity validation is recommended. This includes utilizing biometric measures and behavioral analysis to enhance security while improving user experience. By adopting these advanced controls, organizations can better manage their cyber risks and protect sensitive data in an environment where remote work is likely to remain a staple.


Read the full paper.



The Institute for Critical Infrastructure Technology is a non-partisan 501(c)3 not-for-profit organization. 

EIN #47-5294309

Follow Us

  • LinkedIn
  • Youtube

Important Links

 Support

+  Privacy Policy

Get the latest news & expert opinions delivered straight to your inbox

Keeping People at the Center of Critical Infrastructure
© 2026 by The Institute for Critical Infrastructure Technology (ICIT)
bottom of page