Conduent’s recent disclosure that it discovered a cyber incident on January 13, 2025, which involved unauthorized access to portions of its environment, is a reminder that third party providers sit squarely on the critical path for everyday government payments and benefits. The company statement indicates the intrusion extended back to October 21, 2024, and that some files containing personal information were taken. This is not just a data privacy problem. When vendors that process payments or host disbursement platforms are disrupted, the downstream effect is immediate for households that rely on scheduled benefits and support payments.
Conduent is not a marginal supplier. Its ExpertPay platform processes a very large share of child support and other state disbursements, and the company represents itself as handling billions in annual disbursements and a broad multistate footprint. That concentration of payment volume behind a small number of vendor platforms increases systemic risk. A local outage at a vendor can become a national or multi-state problem simply because payment rails and state disbursement units depend on that single service for electronic transfers, EBT-style card funding, reconciliation, and customer support.
We have seen this template before. Business process outsourcing firms are lucrative targets because they provide broad access into many clients in a single compromise. In 2020 Conduent experienced a ransomware-driven service interruption and investigators documented how attackers exploited provider infrastructure to cause wide operational impact. That historical precedent demonstrates how vendor incidents can interrupt availability and integrity of services even when the original target is not a government agency.
From an attack surface perspective the vulnerabilities that most threaten payment infrastructure at service providers fall into repeatable categories. These include excessive privileged access across client environments, insufficient network segmentation between administrative and payment-processing systems, weak or inconsistent multi-factor authentication for system administrators, outdated remote access appliances and management endpoints, poor or incomplete logging of payment transactions, and inadequate isolation of production payment queues from development or test systems. Each of these failures can transform a foothold into a full operational outage or data exfiltration event. These are not theoretical risks. They are the mechanisms that have driven prior supply chain and outsourcing incidents.
Operationally, the hardest failure mode to recover from is the break in trust and timing for payments. When automated disbursement queues cannot run, agencies face hard choices. They can delay payments, manually generate checks, or divert to alternate rails. Manual workarounds are costly and slow. Contractual service level agreements rarely account for the social harm of a missed benefit payment. That means incident response plans must consider alternative payment channels and preapproved contingencies ahead of time. The question for states and agencies is not whether a vendor will have problems but whether contingency mechanisms have been exercised and funded.
Immediate mitigation steps every agency and vendor should take right now
- Treat payments as critical infrastructure: elevate payment-processing dependencies into the same continuity tier as utilities and communications. Ensure senior leadership reviews the single vendor dependencies and approves contingency budgets.
- Validate isolation and least privilege: require vendors to demonstrate strict role separation for payment flows, with proof of identity controls and hardware-backed MFA for admin paths.
- Force testable fallbacks: require preauthorized alternate rails for emergency disbursements, including relationships with banks or card issuers that can be invoked within hours. Tabletop the invocation process and payment reconciliation procedures quarterly.
- Harden telemetry for payment integrity: end-to-end logging and immutable transaction records are essential. Independent replayable audit trails reduce the time needed to validate and reissue missed payments.
- Contractual requirements and audits: incorporate NIST-based supply chain risk controls and continuous monitoring requirements into vendor contracts. Ensure external attestations and independent audits are performed on a frequent cadence, and that results are shared with relevant state oversight bodies.
Longer term programmatic changes to reduce systemic exposure
- Diversify rails and reduce single points of failure: avoid relying on one vendor for all disbursement types across multiple states. Where consolidation exists for operational efficiency, require logical and geographic redundancy and maintain the capability to split workloads quickly.
- Enforce more granular SLAs tied to social outcomes: payment timeliness guarantees should carry specific operational and financial penalties or mandated remediation actions that reflect the real-world harm of delayed benefits.
- Standardize incident notification and cross-jurisdiction coordination: states and vendors need a playbook for rapid cross-notification so that affected payees and agencies can begin contingency actions within hours rather than days.
- Invest in continual third-party risk monitoring: real-time posture dashboards, continuous configuration checks, and vendor-based penetration testing must be the norm rather than the exception.
What agencies and practitioners should not do
- Do not wait for forensic closure to act operationally. The priority must be restoring and validating payment integrity for affected payees.
- Do not assume public statements from vendors capture the full technical scope. Independent verification through audits, logs, and reconciliations is necessary before resuming normal trust assumptions.
Conclusion
The Conduent incident underscores the structural risk introduced when high-volume payment platforms are centralized with a small number of vendors. Protecting citizen-facing payments requires operational hardening, contractual discipline, tested fallbacks, and regulatory attention to third-party risk. Agencies and vendors must treat payment availability and integrity as mission critical and invest accordingly before the next disruption. The technical controls exist. The task now is to apply them where lives and livelihoods depend on timely disbursement.