SWORDFISH SUPPLY CHAIN SECURITY MODULE

Supply Chain Security Management Module wishes to operationalize and automate the processes for managing the risk imposed by their third parties (suppliers, service providers, affiliate companies, partners and more), mainly attributed to latter’s partial or poor application of appropriate security measures and controls.

  • THIRD PARTIES ASSESSMENT

    THIRD PARTIES ASSESSMENT

    Third Parties can make use of the Supply Chain Security Security Management Module to respond to assessment questionnaires in an easy and intuitive way by using dynamic forms. There is no need to install anything on their premises. Third Parties are automatically notified by e-mail when an assessment task is allocated to them.

CAPABILITIES

Supply Chain Security Management, as part of its core functionality, provides the following capabilities:

  • Readily available Third Parties’ security questionnaires based on their contract and/or internationally recognized security standards (i.e., ISO 27001 and ISO 27002, Cyber Essentials) and leading practices.

  • Real-time monitoring of Third Parties’ adherence level to security requirements and tracking of remediation actions.

  • Map Third Parties to predefined criticality levels. Third Parties are assessed based on Criticality both in terms of Frequency but also in terms of Content and Context.

  • Identified security issues can be categorized, assigned, scheduled, and monitored. The planning scheme includes remediation actions’ implementation responsible, schedule for implementation, mitigation action, etc.

  • Reporting capabilities include a standard set of dashboards and reporting grids. Dashboards and Grids can be also customized.

  • Organize and plan mitigation actions for each identified partial or non-compliance issue.

  • Follow up mitigation actions and enforce deadlines for each working package.

  • Third Parties Assessment can be based on Organization’s Policies as reflected in the Policy Management Module.

  • Benchmarking with peers on regional, international levels based on anonymized data.

  • Non or partial compliance issues can be categorized, assigned, scheduled, and monitored. The planning scheme includes corrective actions’ implementation responsible, schedule, etc.

  • Benchmarking with peers on regional, international levels based on anonymized data.

SOLUTIONS

  • SWORDFISH PLATFORM

    With SWORDFISH®, a risk management and managed threat detection and response platform, we deliver predictability over uncertainty, allowing you to orchestrate and control all aspects of cybersecurity. By centralizing security data, we deliver visibility over your entire digital universe.

    Learn More
  • MANAGED DETECTION & RESPONSE

    Turnkey threat detection and response service that helps our clients manage operational risk and significantly reduce the mean time to detect and respond to cyberattacks.

    Learn More
  • MANAGED RISK & CONTROLS

    An umbrella of solutions that enable clients to effectively manage and orchestrate various aspects of cybersecurity such as governance, risk, compliance, and operations.

    Learn More

CONTACT FORM

Get in touch with us and book your 30 min consultation to learn more about our services and most importantly what are those services applicable to your business to help you stay vigilant and protected.

Gradient Shade
Logo Outline

MRC Brochure

Access the brochure and learn more

Download

SUBSCRIBE TO OUR NEWSLETTER

Obrela regularly releases alerts and insights for security issues across the industries to inform and educate the market with recommendation and trends