CYBER SUPPLY CHAIN SECURITY
Risk Statement
Risk
Supplier Risk
recommendation
Plan
auditor observation
Management review
Risk Likelihood is now updated!
Please select from options!
NAME
--
type
--
Data Privacy
Depending on whether or not the organisation is interacting with personal information, and its sensitivity, they have an obligation to reasonably protect this information.
human factor
Human threats are major contributing factors for malware and targeted attacks, leading to dramatic consequences for the organisations.
suppliers/
partners
Depending on the type of data that is accessible by them or the kind of service they offer, suppliers can pose a significant risk to the organisation.
Privacy Program
Initial
Unassigned
Human Resource
Initial
Unassigned
IS Awareness Training
Initial
Unassigned
Supplier Security Program
Initial
Unassigned
targeted
attacks
Usually target specific industries, pursuing long-term goals with motivations, including political gain, monetary profit, or business data theft.
Cyber Threat Intelligence
Initial
Unassigned
Cryptographic Controls
Initial
Unassigned
Data Security
Initial
Unassigned
BYOD & Mobile Protection
Initial
Unassigned
Remote Connections
Initial
Unassigned
service
disruption
A severe threat to any business to lose their productivity or service offerings due to being attacked by cybercriminals.
compliance
Organisations are behaving differently towards data and information processing facilities that could pose several compliance burdens to the business.
Business Continuity
Initial
Unassigned
Incident
Response
Initial
Unassigned
Physical Security Perimeter
Initial
Unassigned
Organisation of Information Security
Initial
Unassigned
Risk
Management
Initial
Unassigned
Information Security Policy
Initial
Unassigned
Change Management
Initial
Unassigned
Secure Areas
Initial
Unassigned
Secure Backup
Initial
Unassigned
Sub-Policies & Procedures
Initial
Unassigned
Information Security Audit
Initial
Unassigned
Compliance Management
Initial
Unassigned
A severe threat to any business, attacked by cybercriminals for social, personal or politically motivated reasons.
Opportunistic attacks