As best practice, being able to address security requirements with your critical service providers is consistently included in all of the major cyber security standards.
Why is this? Paul Traill, our Head of Risk and Compliance has produced an article for In-procurement Magazine on the topic of ensuring your supply chain is secure and the ways in which organisations can achieve this precisely and effectively.
The article includes overviews into the security risks that a business could be currently facing, the ways in which these can be mitigated and an in-depth explanation into specific practices to be undertaken with the assistance of key tabular data illustrating the security/data protection standards and suppliers assurance.
How PGI can help secure your supply chain
Of course, cyber security should be a key consideration in any decision on new partnerships/collaborations or decisions on suppliers, providers, mergers and acquisitions, but we know you know that. However, sometimes it’s a matter of getting started and that’s often the hardest part.
We offer a range of services to help you gain a deeper understanding and more control over your supply chain management, including our Cyber Assurance as a Service offering, which enables you to call on a full team with specialist expertise for your information and cyber security requirements. This knowledge includes creating and implementing risk assessment processes, creating supplier assurance policies and procedures (such as security-related contract clauses, and due diligence questionnaires), and carrying out onsite supply chain audits.
If you’re ready to take more control of your supply chain, talk to us.
Insights
The 'oligarchisation' of politics online - Digital Threat Digest
Everything that I have learned about the US elections this year has been against my will. Don't get me wrong, I am well aware that whoever controls the White House has significant impact around the world, and I will admit that keeping up with American politics makes me a better analyst.
Threat Intelligence and the Hydra of decentralised Extreme Right-Wing organisations
Digital threat intelligence helps us respond to harmful entities and their activities online. As our professional investigation capability evolves, so do the online tactics of threat actors themselves, in something of a perpetual cat and mouse game.
Weather seeding and FEMA patrols: Conspiracy to armed action - Digital Threat Digest
I don’t think many people have escaped the devastating news about the recent hurricanes that have hit the US in recent weeks.