Cybersecurity Supply Chain Risk Management

Cybersecurity Supply Chain Risk Assessment

The performance of periodic risk assessments is integral to the on-going monitoring component in your  Cybersecurity Supply Chain Risk Management Program.  ERMProtect offers cybersecurity supply chain risk assessment services to ensure that your continuous monitoring objectives are met.  We use best practice monitoring tools including the Shared Assessments Standard Information Gathering Questionnaires (SIGs) (2018 Lite, Core, and Full) and the Cloud Security Alliance’s Cloud Control Matrix (CCM) and the Consensus Assessment Initiative Questionnaire (CAIQ) in designing or executing your risk assessment process.  These tools align with ISO 27002, FFIEC, PCI, COBIT 4.1, the NIST Cybersecurity Framework HIPAA, and GDPR regulations.

Cybersecurity Supply Chain Risk Management Program Development

A Cybersecurity Supply Chain Risk Management Program is critical in protecting your organization from supply chain risk. Your Program should include a cybersecurity supply chain risk management framework and standardized criteria that are used to identify, classify, monitor, and manage supply chain risk on a consistent basis.  A Program ensures that supply chain risk is managed throughout the supplier’s lifecycle in accordance with NIST 800-161 Supply Chain Risk Management guidance that requires that supply chain risks be framed, assessed, responded to, and monitored.

Cybersecurity Supply Chain Risk Management Automation

Automating the processes defined in your Cybersecurity Supply Chain Risk Management Program is critical for keeping up with and coordinating risk management activities within your organization.  We can help you define your requirements and select, configure, and implement your cyber supply chain risk management solution.

Contact Us

Intelligence and Insights

FFIEC CAT to the CRI Cyber Profile 2.0

Why Some Financial Institutions Are Transitioning from FFIEC CAT to the CRI Cyber Profile 2.0

While the FFIEC does not endorse any specific tool, many financial institutions have started adopting the Cyber Risk Institute’s (CRI) Cyber Profile 2.0 …
GLBA Risk Assessments

GLBA Risk Assessments: A Key 1st Step in GLBA Compliance

The GLBA risk assessment is an organization’s starting point for GLBA compliance. We break it all down in this GLBA risk assessment overview …
Web Application Penetration Testing Services

Common Issues in Web Application Penetration Testing Services

Web applications are now ripe targets for hackers. Here we take a look at a few hacker attacks on web applications & how penetration testing services are critical …