This Case Study Underscores Why Ikara’s Capabilities are Critical in a World of Increasing Third-Party Risk, Cyberattacks and Legal Accountability

A major architecture firm’s nightmare reveals the costly gaps in traditional third-party oversight and why proactive supply chain visibility isn’t just best practice, it’s business survival.
Six months after a devastating ransomware attack, a prominent architecture firm was still asking the most dangerous question in cybersecurity: “How did this happen?”
Despite working with incident response providers and managed security services, the organisation remained in the dark about the root cause of their breach, leaving them vulnerable to both future attacks and mounting legal liability.
The eventual answer, uncovered through an independent forensic investigation by FTI Consulting, should send shockwaves through every boardroom relying on third-party IT services: the breach was entirely preventable. It was caused by a specific misconfiguration in remote access systems maintained by the client’s outsourced IT services provider. Even more damaging, the client had limited visibility into whether those responsibilities were ever being met, with no effective audit mechanisms or performance reviews in place.
This case study perfectly illustrates why Ikara’s integrated supply chain visibility platform isn’t just a competitive advantage; it’s an essential defence against the mounting risks of our interconnected digital economy.
The Anatomy of a Preventable Disaster
The attack timeline reads like a textbook example of third-party risk management failure:
1. The Vulnerability: An outsourced IT services provider misconfigured remote access systems, creating an undetected entry point
2. The Breach: Threat actors exploited this vulnerability to gain initial access, then escalated privileges and exfiltrated sensitive data
3. The Aftermath: Data was leaked on the dark web, causing reputational damage and triggering complex legal disputes
4. The Investigation Gap: Six months later, the organisation still couldn’t definitively identify how attackers accessed their systems
What makes this case particularly instructive is that the provider had failed to follow standard security practices and meet contractual service level agreements. Both failures went completely undetected by the client’s oversight processes.

The Hidden Cost of “Set and Forget” Vendor Management
The architecture firm’s experience reveals the fundamental flaw in traditional approaches to third-party risk management. Like many organisations, they had comprehensive contracts with their IT services provider that specified security requirements and service level agreements. The problem wasn’t the quality of their contractual terms; it was the complete absence of ongoing monitoring and validation.
This “set and forget” approach to vendor management creates exactly the type of blind spots that threat actors exploit. When organisations lack real-time visibility into their suppliers’ security posture, compliance status, and operational performance, they’re essentially flying blind through increasingly dangerous airspace.
Consider the cascading costs in this case:
- Direct Financial Impact: Incident response, forensic investigation, legal fees, and potential regulatory penalties
- Operational Disruption: Business interruption during attack response and system recovery
- Reputational Damage: Data leaked on the dark web, affecting both the firm and its clients
- Legal Liability: Exposure to litigation from affected third parties whose data was compromised
- Ongoing Uncertainty: Six months of unresolved questions about system security and vendor reliability

Why Traditional Oversight Failed
The architecture firm’s nightmare scenario demonstrates the fundamental limitations of traditional approaches to third-party risk management. Where conventional vendor oversight relies on point-in-time assessments, annual audits, and reactive monitoring, today’s threat landscape demands continuous, comprehensive visibility across complex supply chains.
The key failures identified in this case study reveal systemic weaknesses in how most organisations manage vendor relationships:
Lack of Real-Time Monitoring: Security misconfigurations went undetected until after they were exploited, despite existing contractual requirements for proper security practices.
Passive Compliance Management: The organisation relied on trust rather than verification, with no active mechanisms to ensure service level agreements were being met.
Fragmented Visibility: Multiple systems and vendors operated without integrated oversight, creating blind spots that threat actors could exploit.
Reactive Investigation Processes: It took six months and an independent forensic investigation to understand what had happened, leaving the organisation vulnerable to ongoing risks and legal liability.
The Legal and Regulatory Imperative
The architecture firm’s experience also highlights the evolving legal landscape around third-party accountability. The forensic findings gave the client and their legal counsel the evidentiary foundation to pursue legal action against the third-party provider, but only after months of uncertainty, significant costs, and reputational damage.
In today’s regulatory environment, organisations can’t afford to wait for post-incident forensic investigations to understand their vendor relationships. Regulators increasingly expect proactive oversight and continuous monitoring of third-party risks. The Australian Privacy Commissioner’s recent determination in the Regional Australia Bank case reinforces this trend that organisations remain fully accountable for their vendors’ security failures, regardless of contractual indemnities.
The New Reality of Digital Supply Chain Accountability
The architecture firm’s ransomware incident serves as a sobering reminder that in today’s interconnected business environment, traditional approaches to third-party risk management are not just inadequate; in fact, they’re dangerous. The six-month gap between the breach and understanding its root cause represents exactly the kind of uncertainty that regulators, boards, and stakeholders will no longer tolerate.
As regulatory expectations continue to evolve and cyber threats become more sophisticated, the organisations that survive and thrive will be those that embrace comprehensive supply chain visibility as not just a compliance requirement, but as a fundamental business capability. The question isn’t whether your organisation will face third-party risks, it’s whether you’ll have the visibility and control needed to manage them effectively when they arise.