How this connects to newsletter issue 3Thisissuefocusedonthedependencyyoucannotquicklyexit.Thenextissuemovesintothefirsthourofaliveincident,wherethe same containment question becomes even sharper.Ifacriticaldependencybecomesunsafe,orifacredibleransomwaresignalappearsinsidetheenvironment,whoisallowedtoact before full certainty exists?Thatiswheredependencyresiliencebecomesdecisionresilience.Theorganisationmayknowwhatneedstobenarrowedor isolated, but unless authority and triggers are pre-agreed, the first hour is negotiated rather than governed.For readers who want to go further:IcansharemoredetailonhowS10Group’splatformhelpscreatecontrolaroundacriticaldependencywhentrustinavendorcan no longer be taken for granted.And for teams that want to pressure-test their own setup:Icanrunafreeremoteresilienceassessmentinyourownsandboxenvironment,withyourexistingsecuritycontrolsenabled,to show how your environment behaves under pressure and what difference that added control makes in practice.If any of these would be relevant for your team, feel free to contact me.sgemert@s10group.comWhere to go nextStart with the identity-trust problem:The Odido lesson: when access still works, but trust does notContinue to first-hour authority:The First Hour: who is allowed to act?
- WHAT CONTAINMENT CHANGES - Containment gives leadership a way to narrow exposure around a vendor that cannot simply be switched off.It turns dependency risk into something that can still be governed.
One pressure-test worth runningA useful capability check here is not a generic vendor review.Take one genuinely critical vendor and run a 45-minute containment-boundary validation around a simple scenario:Assume the vendor is still technically available, but no longer fully trustworthy.Then test, in sequence:•what identities or sessions would need to be invalidated•what integrations could be narrowed or paused first•what data flows could be contained without freezing the whole business•what minimum operational mode is acceptable•who can authorise those moves•what conditions would trigger a partial detach, a full detach, or a controlled fallbackThe value is not proving that the vendor contract exists.The value is discovering whether the organisation has any practical lever when the service cannot simply be terminated.The real lessonThis is why I do not think critical-vendor resilience is mainly a procurement issue.It is an architectural one.Contractsstillmatter.Auditrightsmatter.Incidentreportingclausesmatter.Remediationobligationsmatter.Butinthemoment whenacriticaldependencybecomesunsafe,thosethingsdonotbythemselvescreateroomtoact.Containmentboundaries, access design, token discipline, dependency mapping, and kill-path options do.And that is what makes the issue so uncomfortable.Theorganisationmaydiscoverthatthedependencywasreviewed,approved,renewed,andmonitored—andstillfindthat,when pressure hits, it has very little immediate leverage.So, the question I would leave with is not whether your critical vendors meet policy. It is this:If one of your non-negotiable vendors became unsafe tomorrow, what could you still control by design?That is exactly where S10 Group’s platform fits.Not by replacing the vendor. Not by rewriting the contract after the fact. And not by adding another dashboard.Butbyhelpingorganisationscreateoperationalcontrolwhentrustinacriticaldependencybecomesuncertain:reduceexposure, interruptmaliciousbehaviour,containspread,andpreserveenoughroomtokeepcoreoperationsgovernablewhilethe dependency is being assessed, restricted, or re-routed.Inotherwords,thevalueisnotonlyinknowingthatacriticalvendorhasbecomearisk.Itisinhavingapracticalwaytorespond without losing control of the environment around it.Becausewhenthedependencyisnon-negotiable,leveragedoesnotcomefirstfromlegallanguage.Itcomesfromwhatthe organisation can still isolate, narrow, and protect by design.
- WHAT CONTRACTS CHANGE - Contracts can buy reporting duties, remediation timelines, and audit rights.They do not, on their own, create room to act when the dependency is already inside your critical path.
The hidden problem is not only the vendorThere is also a second layer that makes this harder: fourth-party opacity.Yourorganisationmayknowthenamedvendor.Itoftenknowsmuchlessaboutthevendor’sowndependencychain: subcontractors,cloudservices,identityproviders,softwarecomponents,MSPrelationships,supportchannels,andhiddentrust paths.Publiccyberguidancecontinuestowarnthatincidentsatonesuppliercancascadeintomanycustomerorganisations precisely because those dependencies are not visible enough — or not governable enough — when they suddenly matter most.That is why some vendor failures spread so far.The problem is not only that a supplier was compromised.The problem is that the supplier sat on a trust path no one could narrow quickly enough.What leaders should ask next timeThree board questions are more useful here than a longer checklist.1.Which vendors are critical in practice, not only in category?Not who has a large contract. Who sits inside a process we cannot easily replace, isolate, or degrade.2.If trust in that vendor broke tomorrow, what could we safely restrict first?Access, tokens, data flows, integrations, privileges, shared services, customer-facing features.Inhealthcare,thatmayalsomeanpatientportals,externaldataexchange,VPNpaths,andconnectedworkflowsthatarestill operational but no longer fully trustworthy.3.What is our real exit or fallback position if the dependency becomes unsafe?Not the theoretical one. The one the business could actually live with under pressure.Thesequestionsmatterbecausetheyshifttheconversationfromreassurancetooptions.Andinaliveincident,optionsmatter more than policy language.
- PRESSURE POINT - The most dangerous dependency is often not the one with the biggest contract.It is the one you cannot quickly replace and cannot clearly contain.
The decision boundary that mattersAt that point, the conversation needs to move from vendor management to governability.If the vendor is critical and non-negotiable in the short term, what is the actual lever?Not a penalty clause.Not an angry escalation call.Not a contract line saying the provider “must cooperate”.The real lever is usually architectural:what the vendor can reachwhat identities and tokens flow through the dependencywhat data paths existwhat can be degraded or isolated without collapsing operationswhat fallback mode exists if trust in the vendor becomes uncertainwhat exit trigger has been defined before the crisis rather than during itThat is the core shift in thinking.In moments like this, the instinct is often to ask who got it wrong:which supplier failed, which team approved the dependency, which contract did not protect us strongly enough.The more useful question is why the organisation was left with so little room to move once trust in that dependency started to fail.Thatisusuallywherethereallessonsits—notinblame,butinthedesignchoices,dependencypaths,andcontrolboundariesthatmadethe problem harder to govern.What incidents like ChipSoft actually exposeIncidentsliketheChipSoftcaseareoftendescribedinoperationalterms:asupplierwashit,portalswerepaused,dataexchangewasrestricted, connectionswereclosed.Butthehardertruthisusuallynotonlythatsomethingfailed.Itisthatcustomerorganisationssuddenlyhaveverylittle room to govern the dependency once trust starts to break.It is not that someone missed a checkbox or that the contract had no value.It is that the organisation had not designed enough room to contain, detach, restrict, or degrade the dependency once trust started to fail.A line worth remembering is this:Contracts buy obligations. Architecture buys options.Thisisalsowhyexitstrategydeservesmoreexecutiveattentionthanitusuallygets.RecentDORA-focusedguidancetreatsitaspartofresilience, notmerelyprocurementhygiene:definethetriggers,thefallbackarrangements,thedataprotections,andthetransitionstepsbeforepressure arrives.Becausewhenacriticaldependencybecomesunsafe,therealissueisnotwhetherthecontractallowsexit.Itiswhethertheorganisation has any credible way to reduce reliance without losing control of operations.In that sense, “exit” is often too narrow a word; what matters first is controlled detachability.
- BOARD QUESTION - If a critical vendor became unsafe tomorrow, what could we still restrict, detach, or degrade fast enough to keep control of the business?
A procurement decision that aged badlyThe moment usually does not begin in the incident room. It begins much earlier.Aserviceisrenewedbecauseitisdeeplyembedded,themigrationcostishigh,thebusinessdependsonit,andthevendoris considered“strategic”.Extracontrolsmaybewrittenintothecontract:notificationclauses,remediationtimelines,auditrights, serviceexpectations.Allofthatissensible.BitSight’svendor-contractguidanceexplicitlyrecommendsspecificbreach-notification windows and remediation timelines rather than vague language, and ongoing monitoring across the relationship life cycle.But when the pressure comes, a hard truth appears:contractual rights are not the same as operational leverage.Ifacriticalplatformsitsinsideidentity,payments,customeroperations,claimshandling,caredelivery,oranothercoreprocess,you oftencannotsimply“turnitoff”withoutcreatingasecondproblemofyourown.ThatiswhyDORA-stylethinkinghaspushedexit strategy,resiliencetesting,anddependencyvisibilityintothecentreofoperationalresilienceratherthanleavingthemas procurement afterthoughts.Why this matters nowThe operating environment is becoming harder to govern, not easier.RecentreportingaroundChipSoftshowshowquicklyasupplierincidentcanbecomeacarecontinuityissueforcustomers.More broadly,vendorriskguidancecontinuestostresstwotruthsthatleadersunderestimate:contractsneedexplicitnotificationand remediationexpectations,andthird-partyriskhastobemonitoredacrosstheentirerelationshiplifecycle.Butwhentrustbreaks, monitoringaloneisnotenough.Whatmatterstheniswhethertheorganisationhasalreadydesignedpracticalroomtonarrow access, pause integrations, and contain exposure before operations start to unravel.That changes the leadership question.The issue is no longer only whether the vendor is compliant, or whether the security review was completed at onboarding.It is whether the dependency can be contained when the dependency itself becomes the risk.
- ONE LESSON - Leverage is architecture.When you cannot quickly exit the dependency, control comes from boundaries, access design, and kill-path options.
From identity trust to dependency trustThefirstnewsletterinthisserieslookedattheOdidolesson:amomentwhereaccessstillworks,buttrustnolongerdoes.It showedwhyidentityandaccessarenotonlysecuritycontrols.Theyaregovernanceboundaries,becausetheydefinewhatcanbe reached, restricted and contained when legitimacy becomes uncertain.This second issue moves that same question outward.Whatiftheuncertaintrustpathisnotanindividualaccount,butavendor,platformorsupplierroutetheorganisationdependson tokeepoperating?Atthatpoint,theissueisnolongeronlywhetherthevendorisatfault.Itiswhatthecustomerorganisationcan still narrow, pause, isolate or degrade around that dependency without losing control of its own operations.The dependency you cannot quickly exitAliveexampleofvendordependencyisunfoldinginDutchhealthcarerightnow.ThisiswhyIwantedtowritethisnewsletterissue. Ikeepseeinghowquicklyasupplierincidentcanstopbeing“aboutthevendor”andbecomeacontinuityquestionforeveryone connected to it.ChipSoftwashitbyransomwareonApril7,2026.Roughly70%ofDutchhospitalsusethissupplier.Aftertheincident,theissuedid notremainconfinedtothesupplier.Hospitalsstartedmakingprotectivedecisionsalmostimmediately:OLVGtemporarilystopped exchangingmedicaldatawithhospitalsusingChipSoft,RijnstatecloseditsVPNconnectiontotheaffectedenvironmentonadvice from Z-CERT, and NOS reported that eleven hospitals took patient portals offline.Andthat,tome,istherealsignal:whenacriticaldependencybecomesunsafe,theissueisnolongeronlywhathappenedatthe supplier.Itiswhatcustomerorganisationscanstillrestrict,detach,ordegradearoundthatdependencywithoutlosingcontrolof operations.ThatiswhythisissuebelongsdirectlyaftertheOdidolesson.Identitytrustandvendortrustmaylooklikedifferentproblems,but under pressure they create the same leadership question: when trust changes, what can still be controlled fast enough to matter?That is exactly why this question of dependency matters.Thereisanuncomfortabletruthinmanythird-partyriskdiscussions:onceavendorbecomesunsafe—throughcompromise, credentialabuse,hiddendependencies,oroperationalfailure—theissueisnolongeronlywhetherthesupplierisatfault,oreven whethertheservicematters.Itiswhattheorganisationcanstillrestrict,detach,degrade,orotherwisecontrolaroundthat dependency once it has itself become part of the risk.Somevendorsareonlysuppliersonpaper.Inpractice,theyarepartofhowtheorganisationruns.Andwhenoneofthose dependenciesbecomesunsafe,therealquestionisnolongerwhetherthecontractwaswelldrafted.Itiswhethertheorganisation still has any real room to move.
Newsletter #2 - 08 Apr 2026By Stan van Gemert | S10 GroupDOWNLOAD PDF fileUpdated 14 May 2026
Why leverage is often architectural long before it is contractual.
SOURCES AND FURTHER READINGThisnewsletterdrawsonpublicreporting,healthcareupdates,vendor-riskguidanceandoperational-resiliencematerialaboutthe ChipSoftincident,criticalsupplierdependency,contractuallimits,third-partyexposure,root-causelearningandexit-strategy thinking.1. NOS“Bedrijf dat software levert voor patiëntendossiers aangevallen door hackers”ReportingontheChipSoftcyberincident,thepossibleexposureofpersonaldata,theadvicetodisconnectVPNconnections,and the wider relevance for Dutch healthcare organisations.2. OLVG“Uitwisseling medische gegevens met ziekenhuizen die ChipSoft gebruiken tijdelijk stopgezet”OLVG’supdateexplainingwhymedicaldataexchangewithhospitalsusingChipSoftwastemporarilystoppedasaprecaution,while OLVG’s own care and appointments continued.3. BitSight“Vendor Contract Do’s and Don’ts”Guidanceonvendorcontractlanguage,breach-notificationexpectations,remediationtimelinesandtheneedforongoingthird-party risk monitoring.4. European Payments Council“2025 Payments Threats and Fraud Trends Report”Reportcoveringpayment-sectorthreats,includingsocialengineering,ransomware,third-partycompromise,supply-chainattacks and concentration risks in critical service providers.5. Help Net Security“Financial firms are locking the front door but leaving the back open”Articleonthird-partycyberrisk,supplierexposureandthegapbetweeninternalsecurityinvestmentandexternaldependency control.6. ENISA“ENISA Threat Landscape: Finance Sector”Sectorthreat-landscapereporthighlightingthird-partyrisk,ransomware,supply-chainattacks,operationaldisruptionand resilience requirements in the financial sector.7. Atlassian“The power of 5 Whys: analysis and defense”Practical guidance on root-cause analysis and how to move beyond surface-level explanations after incidents.8. Cognidox“Root cause analysis vs blame culture — the real path to quality”Article on moving away from blame and using root-cause thinking to understand why issues recur.9. Panorays“ICT Exit Strategies to Meet DORA Standards”GuidanceonICTexitstrategies,fallbackplanningandDORA-relatedoperational-resilienceexpectationsforcriticalthird-party dependencies.10. Canadian Centre for Cyber Security“National Cyber Threat Assessment 2025–2026”Threatassessmentdescribinghowcyberincidentscancascadethroughsupplychains,serviceprovidersandinterconnecteddigital dependencies.
From identity trust to dependency trustThefirstnewsletterinthisserieslookedattheOdido lesson:amomentwhereaccessstillworks,buttrust nolongerdoes.Itshowedwhyidentityandaccess arenotonlysecuritycontrols.Theyaregovernance boundaries,becausetheydefinewhatcanbe reached,restrictedandcontainedwhenlegitimacy becomes uncertain.Thissecondissuemovesthatsamequestion outward.Whatiftheuncertaintrustpathisnotanindividual account,butavendor,platformorsupplierroute theorganisationdependsontokeepoperating?At thatpoint,theissueisnolongeronlywhetherthe vendorisatfault.Itiswhatthecustomer organisationcanstillnarrow,pause,isolateor degradearoundthatdependencywithoutlosing control of its own operations.The dependency you cannot quickly exitAliveexampleofvendordependencyisunfoldingin Dutchhealthcarerightnow.ThisiswhyIwantedto writethisnewsletterissue.Ikeepseeinghowquickly asupplierincidentcanstopbeing“aboutthe vendor”andbecomeacontinuityquestionfor everyone connected to it.ChipSoftwashitbyransomwareonApril7,2026. Roughly70%ofDutchhospitalsusethissupplier. Aftertheincident,theissuedidnotremainconfined tothesupplier.Hospitalsstartedmakingprotective decisionsalmostimmediately:OLVGtemporarily stoppedexchangingmedicaldatawithhospitals usingChipSoft,RijnstatecloseditsVPNconnection totheaffectedenvironmentonadvicefromZ-CERT, andNOSreportedthatelevenhospitalstookpatient portals offline.Andthat,tome,istherealsignal:whenacritical dependencybecomesunsafe,theissueisnolonger onlywhathappenedatthesupplier.Itiswhat customerorganisationscanstillrestrict,detach,or degradearoundthatdependencywithoutlosing control of operations.Thatiswhythisissuebelongsdirectlyafterthe Odidolesson.Identitytrustandvendortrustmay looklikedifferentproblems,butunderpressurethey createthesameleadershipquestion:whentrust changes,whatcanstillbecontrolledfastenoughto matter?Thatisexactlywhythisquestionofdependency matters.Thereisanuncomfortabletruthinmanythird-party riskdiscussions:onceavendorbecomesunsafe— throughcompromise,credentialabuse,hidden dependencies,oroperationalfailure—theissueis nolongeronlywhetherthesupplierisatfault,or evenwhethertheservicematters.Itiswhatthe organisationcanstillrestrict,detach,degrade,or otherwisecontrolaroundthatdependencyonceit has itself become part of the risk.Somevendorsareonlysuppliersonpaper.In practice,theyarepartofhowtheorganisationruns. Andwhenoneofthosedependenciesbecomes unsafe,therealquestionisnolongerwhetherthe contractwaswelldrafted.Itiswhetherthe organisation still has any real room to move.
A procurement decision that aged badlyThemomentusuallydoesnotbegininthe incident room. It begins much earlier.Aserviceisrenewedbecauseitisdeeply embedded,themigrationcostishigh,the businessdependsonit,andthevendoris considered“strategic”.Extracontrolsmaybe writtenintothecontract:notificationclauses, remediationtimelines,auditrights,service expectations.Allofthatissensible.BitSight’s vendor-contractguidanceexplicitly recommendsspecificbreach-notification windowsandremediationtimelinesratherthan vaguelanguage,andongoingmonitoring across the relationship life cycle.Butwhenthepressurecomes,ahardtruth appears:contractualrightsarenotthesameas operational leverage.Ifacriticalplatformsitsinsideidentity, payments,customeroperations,claims handling,caredelivery,oranothercore process,youoftencannotsimply“turnitoff” withoutcreatingasecondproblemofyour own.ThatiswhyDORA-stylethinkinghas pushedexitstrategy,resiliencetesting,and dependencyvisibilityintothecentreof operationalresilienceratherthanleavingthem as procurement afterthoughts.Why this matters nowTheoperatingenvironmentisbecomingharder to govern, not easier.RecentreportingaroundChipSoftshowshow quicklyasupplierincidentcanbecomeacare continuityissueforcustomers.Morebroadly, vendorriskguidancecontinuestostresstwo truthsthatleadersunderestimate:contracts needexplicitnotificationandremediation expectations,andthird-partyriskhastobe monitoredacrosstheentirerelationship lifecycle.Butwhentrustbreaks,monitoring aloneisnotenough.Whatmattersthenis whethertheorganisationhasalreadydesigned practicalroomtonarrowaccess,pause integrations,andcontainexposurebefore operations start to unravel.That changes the leadership question.Theissueisnolongeronlywhetherthevendor iscompliant,orwhetherthesecurityreview was completed at onboarding.Itiswhetherthedependencycanbecontained when the dependency itself becomes the risk.
- ONE LESSON - Leverage is architecture.When you cannot quickly exit the dependency, control comes from boundaries, access design, and kill-path options.
- BOARD QUESTION -If a critical vendor became unsafe tomorrow, what could we still restrict, detach, or degrade fast enough to keep control of the business?
The hidden problem is not only the vendorThereisalsoasecondlayerthatmakesthisharder: fourth-party opacity.Yourorganisationmayknowthenamedvendor.It oftenknowsmuchlessaboutthevendor’sown dependencychain:subcontractors,cloudservices, identityproviders,softwarecomponents,MSP relationships,supportchannels,andhiddentrust paths.Publiccyberguidancecontinuestowarnthat incidentsatonesuppliercancascadeintomany customerorganisationspreciselybecausethose dependenciesarenotvisibleenough—ornot governableenough—whentheysuddenlymatter most.That is why some vendor failures spread so far.Theproblemisnotonlythatasupplierwas compromised.Theproblemisthatthesuppliersatonatrustpath no one could narrow quickly enough.What leaders should ask next timeThreeboardquestionsaremoreusefulherethana longer checklist.1.Whichvendorsarecriticalinpractice,not only in category?Notwhohasalargecontract.Whositsinsidea processwecannoteasilyreplace,isolate,or degrade.2.Iftrustinthatvendorbroketomorrow,what could we safely restrict first?Access,tokens,dataflows,integrations, privileges,sharedservices,customer-facing features.Inhealthcare,thatmayalsomeanpatient portals,externaldataexchange,VPNpaths,and connectedworkflowsthatarestilloperational but no longer fully trustworthy.3.Whatisourrealexitorfallbackpositionif the dependency becomes unsafe?Notthetheoreticalone.Theonethebusiness could actually live with under pressure.Thesequestionsmatterbecausetheyshiftthe conversationfromreassurancetooptions.Andina liveincident,optionsmattermorethanpolicy language.
One pressure-test worth runningAusefulcapabilitycheckhereisnotageneric vendor review.Takeonegenuinelycriticalvendorandruna45-minutecontainment-boundaryvalidationarounda simple scenario:Assumethevendorisstilltechnicallyavailable,but no longer fully trustworthy.Then test, in sequence:•whatidentitiesorsessionswouldneedtobe invalidated•whatintegrationscouldbenarrowedorpaused first•whatdataflowscouldbecontainedwithout freezing the whole business•what minimum operational mode is acceptable•who can authorise those moves•whatconditionswouldtriggerapartialdetach,a full detach, or a controlled fallbackThevalueisnotprovingthatthevendorcontract exists.Thevalueisdiscoveringwhetherthe organisationhasanypracticalleverwhenthe service cannot simply be terminated.The real lessonThisiswhyIdonotthinkcritical-vendorresilienceis mainly a procurement issue.It is an architectural one.Contractsstillmatter.Auditrightsmatter.Incident reportingclausesmatter.Remediationobligations matter.Butinthemomentwhenacritical dependencybecomesunsafe,thosethingsdonotby themselvescreateroomtoact.Containment boundaries,accessdesign,tokendiscipline, dependency mapping, and kill-path options do.And that is what makes the issue so uncomfortable.Theorganisationmaydiscoverthatthedependency wasreviewed,approved,renewed,andmonitored— andstillfindthat,whenpressurehits,ithasvery little immediate leverage.So,thequestionIwouldleavewithisnotwhether your critical vendors meet policy. It is this:Ifoneofyournon-negotiablevendorsbecame unsafetomorrow,whatcouldyoustillcontrolby design?That is exactly where S10 Group’s platform fits.Notbyreplacingthevendor.Notbyrewritingthe contractafterthefact.Andnotbyaddinganother dashboard.Butbyhelpingorganisationscreateoperational controlwhentrustinacriticaldependencybecomes uncertain:reduceexposure,interruptmalicious behaviour,containspread,andpreserveenough roomtokeepcoreoperationsgovernablewhilethe dependencyisbeingassessed,restricted,orre-routed.Inotherwords,thevalueisnotonlyinknowingthat acriticalvendorhasbecomearisk.Itisinhavinga practicalwaytorespondwithoutlosingcontrolof the environment around it.Becausewhenthedependencyisnon-negotiable, leveragedoesnotcomefirstfromlegallanguage.It comesfromwhattheorganisationcanstillisolate, narrow, and protect by design.
- PRESSURE POINT - The most dangerous dependency is often not the one with the biggest contract.It is the one you cannot quickly replace and cannot clearly contain.
How this connects to newsletter issue 3Thisissuefocusedonthedependencyyoucannot quicklyexit.Thenextissuemovesintothefirsthour ofaliveincident,wherethesamecontainment question becomes even sharper.Ifacriticaldependencybecomesunsafe,orifa credibleransomwaresignalappearsinsidethe environment,whoisallowedtoactbeforefull certainty exists?Thatiswheredependencyresiliencebecomes decisionresilience.Theorganisationmayknowwhat needstobenarrowedorisolated,butunless authorityandtriggersarepre-agreed,thefirsthour is negotiated rather than governed.For readers who want to go further:IcansharemoredetailonhowS10Group’s platformhelpscreatecontrolaroundacritical dependencywhentrustinavendorcannolongerbe taken for granted.Andforteamsthatwanttopressure-testtheirown setup:Icanrunafreeremoteresilienceassessmentin yourownsandboxenvironment,withyourexisting securitycontrolsenabled,toshowhowyour environmentbehavesunderpressureandwhat difference that added control makes in practice.Ifanyofthesewouldberelevantforyourteam,feel free to contact me.sgemert@s10group.comWhere to go nextStart with the identity-trust problem:TheOdidolesson:whenaccessstillworks,buttrust does notContinue to first-hour authority:The First Hour: who is allowed to act?
- WHAT CONTRACTS CHANGE - Contracts can buy reporting duties, remediation timelines, and audit rights.They do not, on their own, create room to act when the dependency is already inside your critical path.
- WHAT CONTAINMENT CHANGES - Containment gives leadership a way to narrow exposure around a vendor that cannot simply be switched off.It turns dependency risk into something that can still be governed.
Why leverage is often architectural long before it is contractual.
The decision boundary that mattersAtthatpoint,theconversationneedstomovefrom vendor management to governability.Ifthevendoriscriticalandnon-negotiableinthe short term, what is the actual lever?Not a penalty clause.Not an angry escalation call.Notacontractlinesayingtheprovider“must cooperate”.The real lever is usually architectural:what the vendor can reachwhatidentitiesandtokensflowthroughthe dependencywhat data paths existwhatcanbedegradedorisolatedwithoutcollapsing operationswhatfallbackmodeexistsiftrustinthevendor becomes uncertainwhatexittriggerhasbeendefinedbeforethecrisis rather than during itThat is the core shift in thinking.Inmomentslikethis,theinstinctisoftentoaskwho got it wrong:whichsupplierfailed,whichteamapprovedthe dependency,whichcontractdidnotprotectus strongly enough.Themoreusefulquestioniswhytheorganisation wasleftwithsolittleroomtomoveoncetrustinthat dependency started to fail.Thatisusuallywherethereallessonsits—notin blame,butinthedesignchoices,dependencypaths, andcontrolboundariesthatmadetheproblem harder to govern.What incidents like ChipSoft actually exposeIncidentsliketheChipSoftcaseareoftendescribed inoperationalterms:asupplierwashit,portalswere paused,dataexchangewasrestricted,connections wereclosed.Butthehardertruthisusuallynotonly thatsomethingfailed.Itisthatcustomer organisationssuddenlyhaveverylittleroomto govern the dependency once trust starts to break.Itisnotthatsomeonemissedacheckboxorthatthe contract had no value.Itisthattheorganisationhadnotdesignedenough roomtocontain,detach,restrict,ordegradethe dependency once trust started to fail.A line worth remembering is this:Contractsbuyobligations.Architecturebuys options.Thisisalsowhyexitstrategydeservesmore executiveattentionthanitusuallygets.Recent DORA-focusedguidancetreatsitaspartof resilience,notmerelyprocurementhygiene:define thetriggers,thefallbackarrangements,thedata protections,andthetransitionstepsbeforepressure arrives.Becausewhenacriticaldependency becomesunsafe,therealissueisnotwhetherthe contractallowsexit.Itiswhethertheorganisation hasanycrediblewaytoreducereliancewithout losing control of operations.Inthatsense,“exit”isoftentoonarrowaword;what matters first is controlled detachability.
Newsletter #2 - 08 Apr 2026By Stan van Gemert | S10 GroupDOWNLOAD PDF fileUpdated 14 May 2026
SOURCES AND FURTHER READINGThisnewsletterdrawsonpublicreporting, healthcareupdates,vendor-riskguidanceand operational-resiliencematerialabouttheChipSoft incident,criticalsupplierdependency,contractual limits,third-partyexposure,root-causelearningand exit-strategy thinking.1. NOS“Bedrijfdatsoftwarelevertvoorpatiëntendossiers aangevallen door hackers”ReportingontheChipSoftcyberincident,the possibleexposureofpersonaldata,theadviceto disconnectVPNconnections,andthewider relevance for Dutch healthcare organisations.2. OLVG“Uitwisselingmedischegegevensmetziekenhuizen die ChipSoft gebruiken tijdelijk stopgezet”OLVG’supdateexplainingwhymedicaldata exchangewithhospitalsusingChipSoftwas temporarilystoppedasaprecaution,whileOLVG’s own care and appointments continued.3. BitSight“Vendor Contract Do’s and Don’ts”Guidanceonvendorcontractlanguage,breach-notificationexpectations,remediationtimelinesand the need for ongoing third-party risk monitoring.4. European Payments Council“2025 Payments Threats and Fraud Trends Report”Reportcoveringpayment-sectorthreats,including socialengineering,ransomware,third-party compromise,supply-chainattacksandconcentration risks in critical service providers.5. Help Net Security“Financialfirmsarelockingthefrontdoorbut leaving the back open”Articleonthird-partycyberrisk,supplierexposure andthegapbetweeninternalsecurityinvestment and external dependency control.6. ENISA“ENISA Threat Landscape: Finance Sector”Sectorthreat-landscapereporthighlightingthird-partyrisk,ransomware,supply-chainattacks, operationaldisruptionandresiliencerequirements in the financial sector.7. Atlassian“The power of 5 Whys: analysis and defense”Practicalguidanceonroot-causeanalysisandhowto movebeyondsurface-levelexplanationsafter incidents.8. Cognidox“Rootcauseanalysisvsblameculture—thereal path to quality”Articleonmovingawayfromblameandusingroot-cause thinking to understand why issues recur.9. Panorays“ICT Exit Strategies to Meet DORA Standards”GuidanceonICTexitstrategies,fallbackplanning andDORA-relatedoperational-resilience expectations for critical third-party dependencies.10. Canadian Centre for Cyber Security“National Cyber Threat Assessment 2025–2026”Threatassessmentdescribinghowcyberincidents cancascadethroughsupplychains,service providers and interconnected digital dependencies.