gradient-shade
logo-outline

SWORDFISH SUPPLY CHAIN SECURITY MODULE

Supply Chain Security Management Module wishes to operationalize and automate the processes for managing the risk imposed by their third parties (suppliers, service providers, affiliate companies, partners and more), mainly attributed to latter’s partial or poor application of appropriate security measures and controls.

  • THIRD PARTIES ASSESSMENT

    THIRD PARTIES ASSESSMENT

    Third Parties can make use of the Supply Chain Security Security Management Module to respond to assessment questionnaires in an easy and intuitive way by using dynamic forms. There is no need to install anything on their premises. Third Parties are automatically notified by e-mail when an assessment task is allocated to them.

CAPABILITIES

Supply Chain Security Management, as part of its core functionality, provides the following capabilities:

  • Icon

    Readily available Third Parties’ security questionnaires based on their contract and/or internationally recognized security standards (i.e., ISO 27001 and ISO 27002, Cyber Essentials) and leading practices.

  • Icon

    Real-time monitoring of Third Parties’ adherence level to security requirements and tracking of remediation actions.

  • Icon

    Map Third Parties to predefined criticality levels. Third Parties are assessed based on Criticality both in terms of Frequency but also in terms of Content and Context.

  • Icon

    Identified security issues can be categorized, assigned, scheduled, and monitored. The planning scheme includes remediation actions’ implementation responsible, schedule for implementation, mitigation action, etc.

  • Icon

    Reporting capabilities include a standard set of dashboards and reporting grids. Dashboards and Grids can be also customized.

  • Icon

    Organize and plan mitigation actions for each identified partial or non-compliance issue.

  • Icon

    Follow up mitigation actions and enforce deadlines for each working package.

  • Icon

    Third Parties Assessment can be based on Organization’s Policies as reflected in the Policy Management Module.

  • Icon

    Benchmarking with peers on regional, international levels based on anonymized data.

  • Icon

    Non or partial compliance issues can be categorized, assigned, scheduled, and monitored. The planning scheme includes corrective actions’ implementation responsible, schedule, etc.

  • Icon

    Benchmarking with peers on regional, international levels based on anonymized data.

CONTACT FORM

Get in touch with us and book your 30 min consultation to learn more about our services and most importantly what are those services applicable to your business to help you stay vigilant and protected.

Gradient Shade
Logo Outline

MRC Brochure

Access the brochure and learn more

Download
bg-shape

SUBSCRIBE TO OUR NEWSLETTER

Obrela regularly releases alerts and insights for security issues across the industries to inform and educate the market with recommendation and trends