Supply Chain Security

Organisations understand that cybersecurity doesn’t stop at your own doorstep. In a connected world, every supplier, vendor, and partner forms part of your defence perimeter. That’s why supply chain security is a key pillar of our risk management strategy.

We start with rigorous supplier risk assessments. Before onboarding, every supplier is carefully vetted. We review their security policies, request evidence of certifications, and, where necessary, conduct audits. Only those who meet your standards are cleared to handle sensitive data or integrate with your systems.

Once approved, the work doesn’t stop. You should monitor all suppliers continuously, ensuring they maintain strong security postures. Contracts include mandatory security clauses, and critical suppliers are subject to annual reviews.

Strong policies ensure that:

  • Every supplier completes a risk assessment before approval.

  • Contracts enforce data protection and security standards.

  • Annual reviews are mandatory for critical suppliers.

In the event of an issue, you activate your incident response procedures. Supplier-related incidents are logged, investigated and resolved using standardised forms to maintain oversight and ensure accountability.

By embedding security across the entire supplier lifecycle, You protect your organisation and clients from risks that may arise far beyond our immediate control.

Checkpoint

Darktrace

LocateRisk

Rapid7

Tenable