Under the Surface: Uncovering Cyber Risk in the Global Supply Chain

Almost there! Complete this final step to get your ebook.




Fill out the details below

Which of these cybersecurity capabilities would be most impactful to your organization? *

End-to-end third-party risk management
Automating risk assessments and onboarding workflows
Standardizing and centralizing vendor tiering practices
Simplifying and integrating VRM across departments (security, legal, procurement)
Proving TPRM ROI through measurable risk reduction
Ensuring compliance with evolving vendor risk regulations
Establishing and enforcing risk thresholds for third-party vendors
N/A - None of these cybersecurity capabilities would be impactful to our organization

How does your team currently evaluate and onboard new vendors from a cybersecurity standpoint? *

We manually send out questionnaires and review responses over email or spreadsheets
We use standardized frameworks like SIG, CIS Controls, or NIST
We request certifications (e.g., SOC 2, ISO 27001) and security artifacts during onboarding
We automate portions of the onboarding workflow using a dedicated VRM tool
Our onboarding process varies depending on the business unit or vendor type
We struggle to scale assessments across a large vendor base
We do not currently have a formal onboarding process in place

What criteria do you use to tier or prioritize your vendors for security reviews? *

We tier vendors based on criticality to business operations
We consider the type of data vendors access or manage (e.g., PII, PHI, financial)
We review vendor exposure to specific compliance or regulatory frameworks
We do not currently use a formal tiering model
All vendors receive the same assessment regardless of risk
We’ve defined reassessment cadences based on risk tier
We would benefit from a more structured or automated tiering approach

What stage are you in for evaluating a new cybersecurity solution? *

Exploratory
Actively Researching
Budget Set Aside
Reviewing RFPs from Vendors
N/A - we're not currently evaluating new cybersecurity solutions

What is your timeline for evaluating solutions and making decisions? *

Next 30 Days
Next 60 Days
Next 90 Days
More than 90 Days
N/A

Do you have budget approved for this project? *

Yes
No

I agree that BitSight Services may use my data for marketing purposes, including contacting me via phone or email.

By providing my information, I acknowledge and consent to the processing and storage of my personal data for marketing and communication purposes. Privacy Policy.