[Expert Opinion] Gallo Fall: "Reclaiming Senegal's digital sovereignty after the DAF cyberattack"

By Cybersol·February 26, 2026·5 min read
SourceOriginally from [Expert Opinion] Gallo Fall: "Reclaiming Senegal's digital sovereignty after the DAF cyberattack" by SenewebView original

Vendor Concentration in Critical Infrastructure: When Cyberattacks Expose Sovereignty Gaps

Why This Matters for Governance and Regulatory Exposure

Senegal's breach of its national identification system (DAF) reveals a structural governance failure that extends far beyond operational incident response. When critical infrastructure depends entirely on a single foreign vendor—particularly one geographically distant and potentially entangled in commercial disputes with the state—cyberattacks become instruments that expose not just technical vulnerabilities but fundamental questions of digital sovereignty and regulatory jurisdiction. For EU organizations operating under NIS2 and DORA frameworks, this incident demonstrates why vendor risk management cannot remain confined to procurement checklists or IT security assessments. The convergence of technical compromise, vendor dependency, and geopolitical tension creates cascading liability exposure that traditional governance structures are poorly equipped to manage.

The Sovereignty-Vendor Dependency Nexus

The DAF incident illustrates a critical governance blind spot: the assumption that operational continuity and national security can be safely outsourced to external providers. According to expert analysis published by Seneweb, Senegal's identification infrastructure operated entirely under foreign supplier control, meaning that during a national emergency—precisely when system resilience matters most—the state's ability to restore critical services depended on vendor cooperation and vendor infrastructure located outside national jurisdiction. This is not a procurement inefficiency; it is a structural vulnerability that collapses the distinction between technical risk and strategic risk. When a cyberattack occurs against infrastructure managed by a foreign vendor, incident response becomes entangled with questions of data sovereignty, cross-border notification obligations, and potential conflicts between contractual commitments and national security imperatives.

The Amplification Effect: Commercial Disputes and Technical Vulnerability

The analysis highlights a particularly acute governance risk: the vendor was reportedly engaged in a financial dispute with the state at the time of the breach. This convergence—technical compromise, vendor dependency, and commercial tension—creates conditions where vendor cooperation cannot be assumed. Organizations often fail to model scenarios where vendors become adversarial or uncooperative during incident response, particularly where trade disputes or regulatory enforcement actions are underway. For critical infrastructure operators, this represents a notification and remediation nightmare: if vendor cooperation is uncertain, incident investigation becomes prolonged, forensic access may be restricted, and restoration timelines become unpredictable. EU entities subject to NIS2 requirements must now consider whether vendor disputes should trigger enhanced monitoring or contingency planning, yet few governance frameworks explicitly address this intersection.

Jurisdictional Complexity and Contractual Liability Exposure

When foreign vendors control critical systems, breach notification becomes a multi-jurisdictional problem. Senegal faced the requirement to report the incident to national authorities, but the vendor's location, the data's location, and the systems' location may all fall under different regulatory regimes. EU organizations face similar complexity under GDPR, NIS2, and sector-specific regulations (DORA for financial services, for example). A breach at a critical vendor may trigger notification obligations in multiple jurisdictions simultaneously, with conflicting timelines and disclosure requirements. Additionally, contractual terms negotiated during procurement may not adequately address incident response scenarios where vendor cooperation is essential but uncertain. Organizations often discover during actual breaches that their vendor contracts lack clear provisions for forensic access, data recovery timelines, or liability allocation when the vendor itself is compromised. This contractual gap becomes particularly acute when the vendor is foreign and subject to different legal frameworks.

The Overlooked Risk Layer: Vendor Concentration as a Supply Chain Chokepoint

Cybersol's perspective on this incident emphasizes a systemic weakness that governance teams consistently underestimate: vendor concentration in critical functions creates not just operational risk but regulatory and diplomatic risk. Traditional vendor risk assessments focus on financial stability, technical capability, and compliance certifications. They rarely model scenarios where a single vendor breach cascades into questions of national security, data sovereignty, or geopolitical leverage. For EU organizations, this gap is particularly acute. NIS2 and DORA frameworks increasingly require organizations to map critical dependencies and assess third-party risk, yet most governance structures still treat vendor risk as a procurement or IT security function rather than a board-level strategic concern. The DAF incident demonstrates why this siloed approach fails: when a vendor breach intersects with commercial disputes, geopolitical tension, or regulatory enforcement, the incident becomes a governance crisis that requires coordination across legal, compliance, regulatory affairs, and executive leadership.

Organizations often overlook the importance of jurisdictional diversity in critical vendor relationships. Concentrating essential functions with a single foreign vendor creates a single point of failure that is difficult to remediate quickly. EU entities should evaluate whether critical vendors should be distributed across multiple jurisdictions, whether backup vendors should be contractually mandated, and whether critical functions should be subject to geographic redundancy requirements. This is not merely a resilience question; it is a regulatory compliance question under emerging frameworks that increasingly emphasize operational resilience as a governance responsibility.

Closing Reflection

The DAF breach in Senegal serves as a governance case study for organizations worldwide, particularly those operating under EU regulatory frameworks. It demonstrates that vendor risk management must extend beyond technical assessments to include strategic vulnerability analysis, jurisdictional mapping, and scenario planning for vendor non-cooperation. Organizations should review the complete expert analysis published by Seneweb to understand the full context of how geopolitical factors, commercial disputes, and technical vulnerabilities converge to create governance exposure. For governance teams, the lesson is clear: critical infrastructure dependencies on foreign vendors require board-level oversight, contractual provisions that address incident response scenarios, and contingency planning that does not assume vendor cooperation will be available when needed most.

Source: Seneweb, "[Expert Opinion] Gallo Fall: 'Reclaiming Senegal's digital sovereignty after the DAF cyberattack'" https://www.seneweb.com/en/news/Technologie/expert-opinion-gallo-fall-reclaiming-senegals-digital-sovereignty-after-the-daf-cyberattack_n_482921.html