{"id":19933,"date":"2024-07-25T09:00:05","date_gmt":"2024-07-25T09:00:05","guid":{"rendered":"https:\/\/rbadvisoryllc.com\/stag\/?p=19933"},"modified":"2025-06-20T19:30:20","modified_gmt":"2025-06-20T19:30:20","slug":"navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage","status":"publish","type":"post","link":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/","title":{"rendered":"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"19933\" class=\"elementor elementor-19933\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-80e7022 elementor-section-boxed elementor-section-height-default elementor-section-height-default edgtf-elementor-container-no edgtf-section edgtf-parallax-section-holder-touch-disabled edgtf-parallax-section-no\" data-id=\"80e7022\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-521b2b6\" data-id=\"521b2b6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-364541c elementor-widget elementor-widget-text-editor\" data-id=\"364541c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400; color: #333333;\">In today&#8217;s interconnected digital landscape, the reliance on third-party vendors for critical services is both a necessity and a potential vulnerability. The recent global IT outage caused by a faulty software update from CrowdStrike\u2014a renowned cybersecurity firm\u2014serves as a stark reminder of the inherent risks associated with third-party dependencies.<\/span><\/p><h3><span style=\"color: #333333;\"><b>The Incident<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #333333;\">On July 19, 2024, CrowdStrike released a software update for their Falcon sensor, which inadvertently caused widespread system crashes across various industries, including healthcare, aviation, and finance. The update, meant to enhance security, instead resulted in system malfunctions due to a logic error in the update process. The fallout was significant, grounding flights, disrupting hospital operations, and causing financial system failures globally.<\/span><\/p><h3><span style=\"color: #333333;\"><b>Why Third-Party Vulnerabilities Matter<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #333333;\">This incident highlights the critical issue of third-party vulnerabilities. When companies depend heavily on external vendors for essential services, the risk of cascading failures increases. A single point of failure, such as a flawed update from a trusted vendor, can lead to widespread disruptions that affect business continuity, data security, and customer trust.<\/span><\/p><h3><span style=\"color: #333333;\"><b>Strategies for Mitigation<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #333333;\">As a cybersecurity consulting firm, RB Advisory offers several strategies companies can employ to mitigate the risks associated with third-party services:<\/span><\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"color: #333333;\"><b>Comprehensive Vendor Risk Management:<\/b><span style=\"font-weight: 400;\">\u00a0Establish a robust vendor risk management framework. This includes thorough vetting of third-party vendors, continuous monitoring of their security practices, and regular audits. Understanding the security measures and incident response capabilities of your vendors is crucial.<\/span><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"color: #333333;\"><b>Implementing Redundancies:<\/b><span style=\"font-weight: 400;\">\u00a0To minimize the impact of a vendor outage, implement redundancies wherever possible. This can include maintaining backup systems, alternative suppliers, or multi-vendor strategies to ensure that critical services are not solely dependent on a single provider.<\/span><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"color: #333333;\"><b>Regular Testing and Validation:<\/b><span style=\"font-weight: 400;\">\u00a0Just as important as vendor selection is the practice of regular testing and validation of updates and patches. Before deploying any software update, conduct comprehensive testing in a controlled environment to identify potential issues. This step can prevent disruptions similar to those caused by the CrowdStrike update.<\/span><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"color: #333333;\"><b>Clear Communication Channels:<\/b><span style=\"font-weight: 400;\">\u00a0In the event of a third-party incident, clear and efficient communication channels are vital. Companies should establish protocols for timely updates from vendors and ensure that these are communicated effectively within the organization.<\/span><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"color: #333333;\"><b>Incident Response Planning:<\/b><span style=\"font-weight: 400;\">\u00a0Develop and maintain an incident response plan that includes scenarios involving third-party failures. This plan should outline steps for mitigating damage, restoring services, and communicating with stakeholders.<\/span><\/span><\/li><\/ol><h3><span style=\"color: #333333;\"><b>Conclusion<\/b><\/span><\/h3><p><span style=\"font-weight: 400; color: #333333;\">The CrowdStrike outage is a potent reminder that even the most reputable vendors can experience failures. For companies, the key takeaway is the necessity of proactive risk management strategies to safeguard against third-party vulnerabilities. At RB Advisory, we emphasize the importance of resilience and preparedness in navigating the complex landscape of cybersecurity threats.<\/span><\/p><p><span style=\"font-weight: 400; color: #333333;\">By implementing these strategies, companies can better protect themselves from the ripple effects of third-party outages, ensuring continuity and security in their operations.<\/span><\/p><p><span style=\"font-weight: 400; color: #333333;\">For more insights on managing cybersecurity risks and third-party vulnerabilities, visit our website or contact our experts at RB Advisory.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c59c873 elementor-section-boxed elementor-section-height-default elementor-section-height-default edgtf-elementor-container-no edgtf-section edgtf-parallax-section-holder-touch-disabled edgtf-parallax-section-no\" data-id=\"c59c873\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-be240cd\" data-id=\"be240cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>(Orlando, FL) \u2013 RB Advisory, LLC under the pioneering leadership of CEO Regine Bonneau, is proud to announce its inclusion in the Top 100 Women-Led Businesses in Florida for 2024. This prestigious accolade, awarded by The Women\u2019s Edge, recognizes firms excelling in revenue, workplace diversity, innovation, and customer benefits.<\/p>\n","protected":false},"author":7,"featured_media":19935,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"give_campaign_id":0,"footnotes":""},"categories":[86],"tags":[31],"class_list":["post-19933","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-prevention"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage - RB Advisory LLC<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage - RB Advisory LLC\" \/>\n<meta property=\"og:description\" content=\"(Orlando, FL) \u2013 RB Advisory, LLC under the pioneering leadership of CEO Regine Bonneau, is proud to announce its inclusion in the Top 100 Women-Led Businesses in Florida for 2024. This prestigious accolade, awarded by The Women\u2019s Edge, recognizes firms excelling in revenue, workplace diversity, innovation, and customer benefits.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/\" \/>\n<meta property=\"og:site_name\" content=\"RB Advisory LLC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/rbadvisory\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-25T09:00:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T19:30:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/08\/BSOD-image.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1300\" \/>\n\t<meta property=\"og:image:height\" content=\"845\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"RB Advisory\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RB Advisory\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/\"},\"author\":{\"name\":\"RB Advisory\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#\\\/schema\\\/person\\\/c05edbb1b82bfafce72cc3e03fca14ea\"},\"headline\":\"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage\",\"datePublished\":\"2024-07-25T09:00:05+00:00\",\"dateModified\":\"2025-06-20T19:30:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/BSOD-image.webp\",\"keywords\":[\"Prevention\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/\",\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/\",\"name\":\"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage - RB Advisory LLC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/BSOD-image.webp\",\"datePublished\":\"2024-07-25T09:00:05+00:00\",\"dateModified\":\"2025-06-20T19:30:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/#primaryimage\",\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/BSOD-image.webp\",\"contentUrl\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/BSOD-image.webp\",\"width\":1300,\"height\":845,\"caption\":\"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#website\",\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/\",\"name\":\"RB Advisory LLC\",\"description\":\"Security Compliance | Cyber Risk Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#organization\",\"name\":\"RB Advisory LLC\",\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/RBA-Logo-712-x-712.webp\",\"contentUrl\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/RBA-Logo-712-x-712.webp\",\"width\":712,\"height\":712,\"caption\":\"RB Advisory LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/rbadvisory\\\/\",\"https:\\\/\\\/x.com\\\/rb_advisoryllc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rb-advisory-llc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCO00f-z_bXxpQ3DcXzgvmNQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#\\\/schema\\\/person\\\/c05edbb1b82bfafce72cc3e03fca14ea\",\"name\":\"RB Advisory\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g\",\"caption\":\"RB Advisory\"},\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/author\\\/rb-advisory\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage - RB Advisory LLC","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage - RB Advisory LLC","og_description":"(Orlando, FL) \u2013 RB Advisory, LLC under the pioneering leadership of CEO Regine Bonneau, is proud to announce its inclusion in the Top 100 Women-Led Businesses in Florida for 2024. This prestigious accolade, awarded by The Women\u2019s Edge, recognizes firms excelling in revenue, workplace diversity, innovation, and customer benefits.","og_url":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/","og_site_name":"RB Advisory LLC","article_publisher":"https:\/\/www.facebook.com\/rbadvisory\/","article_published_time":"2024-07-25T09:00:05+00:00","article_modified_time":"2025-06-20T19:30:20+00:00","og_image":[{"width":1300,"height":845,"url":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/08\/BSOD-image.webp","type":"image\/webp"}],"author":"RB Advisory","twitter_card":"summary_large_image","twitter_misc":{"Written by":"RB Advisory","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/#article","isPartOf":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/"},"author":{"name":"RB Advisory","@id":"https:\/\/rbadvisoryllc.com\/stag\/#\/schema\/person\/c05edbb1b82bfafce72cc3e03fca14ea"},"headline":"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage","datePublished":"2024-07-25T09:00:05+00:00","dateModified":"2025-06-20T19:30:20+00:00","mainEntityOfPage":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/"},"wordCount":498,"publisher":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/#organization"},"image":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/#primaryimage"},"thumbnailUrl":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/08\/BSOD-image.webp","keywords":["Prevention"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/","url":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/","name":"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage - RB Advisory LLC","isPartOf":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/#primaryimage"},"image":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/#primaryimage"},"thumbnailUrl":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/08\/BSOD-image.webp","datePublished":"2024-07-25T09:00:05+00:00","dateModified":"2025-06-20T19:30:20+00:00","breadcrumb":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/#primaryimage","url":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/08\/BSOD-image.webp","contentUrl":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/08\/BSOD-image.webp","width":1300,"height":845,"caption":"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage"},{"@type":"BreadcrumbList","@id":"https:\/\/rbadvisoryllc.com\/stag\/navigating-the-complexities-of-third-party-vulnerabilities-lessons-from-the-crowdstrike-outage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rbadvisoryllc.com\/stag\/"},{"@type":"ListItem","position":2,"name":"Navigating the Complexities of Third-Party Vulnerabilities: Lessons from the CrowdStrike Outage"}]},{"@type":"WebSite","@id":"https:\/\/rbadvisoryllc.com\/stag\/#website","url":"https:\/\/rbadvisoryllc.com\/stag\/","name":"RB Advisory LLC","description":"Security Compliance | Cyber Risk Management","publisher":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rbadvisoryllc.com\/stag\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/rbadvisoryllc.com\/stag\/#organization","name":"RB Advisory LLC","url":"https:\/\/rbadvisoryllc.com\/stag\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rbadvisoryllc.com\/stag\/#\/schema\/logo\/image\/","url":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/07\/RBA-Logo-712-x-712.webp","contentUrl":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/07\/RBA-Logo-712-x-712.webp","width":712,"height":712,"caption":"RB Advisory LLC"},"image":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/rbadvisory\/","https:\/\/x.com\/rb_advisoryllc","https:\/\/www.linkedin.com\/company\/rb-advisory-llc\/","https:\/\/www.youtube.com\/channel\/UCO00f-z_bXxpQ3DcXzgvmNQ"]},{"@type":"Person","@id":"https:\/\/rbadvisoryllc.com\/stag\/#\/schema\/person\/c05edbb1b82bfafce72cc3e03fca14ea","name":"RB Advisory","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g","caption":"RB Advisory"},"url":"https:\/\/rbadvisoryllc.com\/stag\/author\/rb-advisory\/"}]}},"_links":{"self":[{"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/posts\/19933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/comments?post=19933"}],"version-history":[{"count":4,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/posts\/19933\/revisions"}],"predecessor-version":[{"id":19938,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/posts\/19933\/revisions\/19938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/media\/19935"}],"wp:attachment":[{"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/media?parent=19933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/categories?post=19933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/tags?post=19933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}