SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsUncover crucial strategies to improve your vendor risk assessments.
Vendor risk assessments are essential for robust security strategies, but are your assessments truly effective in minimizing risks and building strong vendor relationships? As the threat landscape evolves, it's crucial to reassess and enhance your vendor risk processes. This blog explores the intricacies of vendor risk assessments and reveals innovative strategies to strengthen your security framework.
For many years, organizations have relied on traditional vendor risk assessments. These methods often include sending out questionnaires, accepting security attestations, or conducting onsite evaluations. However, the effectiveness of these traditional assessments is sometimes limited. To enhance your current processes, it's essential to understand their value and limitations.
Choosing the right type of assessment can be daunting. For instance, when should you opt for self-attestation versus a third-party assessment? Self-attestations, though cost-effective and easy to scale, offer low confidence. Conversely, while providing higher confidence, third-party assessments can be expensive and lack specific context. Balancing these factors is critical to an effective vendor risk assessment strategy.
Understanding the procurement's risk level is crucial. A short risk triaging process can help categorize vendors into low, medium, and high risk, informing the assessment process and frequency. Here are five yes/no questions commonly used:
After triaging, you'll have three discrete risk groups. Ideally, the number of high-risk vendors should match your assessment resources. High-risk assessments are resource-intensive, so choose wisely.
Improving your vendor assessments framework can seem challenging, but several innovative methods can make a significant difference. One practical approach is leveraging artificial intelligence (AI) to scale and optimizing vendor risk programs. AI can quickly analyze vast amounts of data, identifying patterns and potential risks that traditional methods might miss.
Different assessment methods have varying levels of confidence, risk ranking, cost, scalability, and vendor participation:
Vendor risk assessments are more critical than ever in ensuring the security and integrity of your supply chain. Enhancing your assessment processes and utilizing the comprehensive security assessment matrix can build stronger, more secure vendor relationships and improve your overall security posture. Stay proactive in refining your strategies, and leverage the tools and insights provided to drive your security programs to new heights.
You can access the comprehensive security assessment matrix here. Use it to map out and right-size your vendor assessment programs according to your organization's specific risks and resources.
If you missed the first webcast in our Mastering Supply Chain Security series, watch it here.
Register for parts 2 and 3 below:
Tony Turner has reshaped critical infrastructure security by advancing SBOM maturity and Cyber-Informed Engineering, while pioneering adversarial AI simulations and digital twin technologies as VP at Frenos.
Read more about Tony Turner