Cybersecurity Supply Chain Risk Management

Cybersecurity Supply Chain Risk Assessment

The performance of periodic risk assessments is integral to the on-going monitoring component in your  Cybersecurity Supply Chain Risk Management Program.  ERMProtect offers cybersecurity supply chain risk assessment services to ensure that your continuous monitoring objectives are met.  We use best practice monitoring tools including the Shared Assessments Standard Information Gathering Questionnaires (SIGs) (2018 Lite, Core, and Full) and the Cloud Security Alliance’s Cloud Control Matrix (CCM) and the Consensus Assessment Initiative Questionnaire (CAIQ) in designing or executing your risk assessment process.  These tools align with ISO 27002, FFIEC, PCI, COBIT 4.1, the NIST Cybersecurity Framework HIPAA, and GDPR regulations.

Cybersecurity Supply Chain Risk Management Program Development

A Cybersecurity Supply Chain Risk Management Program is critical in protecting your organization from supply chain risk. Your Program should include a cybersecurity supply chain risk management framework and standardized criteria that are used to identify, classify, monitor, and manage supply chain risk on a consistent basis.  A Program ensures that supply chain risk is managed throughout the supplier’s lifecycle in accordance with NIST 800-161 Supply Chain Risk Management guidance that requires that supply chain risks be framed, assessed, responded to, and monitored.

Cybersecurity Supply Chain Risk Management Automation

Automating the processes defined in your Cybersecurity Supply Chain Risk Management Program is critical for keeping up with and coordinating risk management activities within your organization.  We can help you define your requirements and select, configure, and implement your cyber supply chain risk management solution.

Contact Us

Intelligence and Insights

Mobile Application Security - Why You Should Focus On IT

Mobile Application Security – Why You Should Focus On IT

Mobile applications ease every day and workday tasks. Yet, they pose vulnerabilities and threats that must be addressed. This article provides guidance on how penetration testing and other best practices will help you secure mobile …
How Hackers Crack Passwords and What You Can Do About It

How Hackers Crack Passwords and What You Can Do About It

When a password is the only thing standing between hackers and data, you can count of them to capitalize on weak passwords. Here’s how you can strengthen your passwords to avoid becoming the victim of …
Understanding the Key Components of a SOC2 Report

Understanding the Key Components of a SOC2 Report

SOC 2 audit reports follow a basic outline. In each report, you will find the vendor’s management assertion, the independent auditor’s report, the vendor’s description of its system, and a listing of controls tested …