The Risk Ledger assessment gives your clients assurance that your organisation maintains an appropriate level of risk controls in order to protect both yourself, and them, from cyber incidents.
You have been asked to complete an assessment by your client because third-party risk management is:
You can read more about the importance of managing supply chain security risks in this article from the National Cyber Security Centre (NCSC).
No, Risk Ledger is free and always will be free for suppliers to join and use the platform to showcase their security regime to clients.
Ensuring the security of our platform and its users is central to what we do at Risk Ledger. We maintain strict security and confidentiality controls to ensure that your information remains secure. You can review Risk Ledger's security assessment yourself using the platform! Just request access by emailing support@riskledger.com.
Privacy:
The only data visible to organisations you are not connected with is your company’s name and the country it is registered in to allow connection requests to be sent and accepted.
Security:
For further information on our security and privacy policy please visit the below pages:
Your Risk Ledger assessment is only visible to the organisations you chose to share it with - nobody else. You are in complete control of your profile and data on Risk Ledger.
Organisations on Risk Ledger can request access to your assessment by sending you a connection request on the platform. They will only gain visibility of your assessment if and when an authorised user on your account has accepted the request.
The only data visible to other organisations you are not connected with is your company’s name and the country it is registered in to allow connection requests to be sent and accepted.
We have very strict confidentiality and data protection in place at Risk Ledger. Visit the links below for more information on this:
Yes, once you have completed your supplier assessment, you can take advantage of the free tools we have designed to ensure your Risk Ledger assessment is the last one you ever have to complete.
You can share access to your Risk Ledger assessment at the click of a button with any other client who requires you to complete a security risk assessment so you can avoid manual spreadsheets and long email conversations about the assessment.
There are two ways in which you can share your Risk Ledger assessment, even if your client isn't a Risk Ledger user themselves:
You can also provide a client contact's email address and the platform will send them the new link directly. Only your assessment answers and notes are shared with the link, but not any evidence.
To access your evidence, the client can sign up to Risk Ledger for free and connect with you through the platform.
A link expires in 1 month, but can be invalidated earlier if needed by clicking the bin icon.
If your client stops using Risk Ledger or they delete the connection between your organisation and their organisation on the platform, you will no longer have an active connection with them on Risk Ledger. You can see and manage client connections while signed in to your Risk Ledger account in the "Clients" list.
Once a connection is no longer active, we keep an audit log for your client of your Risk Ledger assessment as it was at the point of deletion. This is to allow an audit trail of your client's third-party risk management activities to be maintained.
Only authorised users in your organisation manage your Risk Ledger account and data so your profile on the platform will exist unless you delete your account. As long as your organisation has an account, you can share access to your Risk Ledger assessment for the clients you choose - nobody else.
If a supplier deletes their account, all personal data is removed from Risk Ledger, and clients who were connected with that supplier have visibility of their supplier assessment as it was at the point of deletion for the purpose of an audit trail.
When you are no longer a supplier to a client you or your client can delete your connection on Risk Ledger - just click the "Remove Client" button on the client overview page. Removing a client connection will have no impact on your connection with any other client who you are connected with on Risk Ledger.
Once a connection is deleted, your supplier profile will no longer be visible to that client. We do keep an audit log available for the client of the Risk Ledger assessment as it was at the point of deletion to ensure there is an audit trail.
Clients will invite their main point of contact at your organisation, which tends to be a commercial contact. Once signed up, you are able to add an unlimited number of users to collaborate on completing the assessment. The first person to sign up on behalf of your organisation and users with 'admin' status can invite all relevant colleagues to complete sections of the assessment relevant to their role and expertise. This usually includes colleagues from the information/cyber security, IT and information governance teams.
You can see the full list of controls and domains covered in the Risk Ledger assessment here to guide you on who may need to be added as a user from your organisation to collaborate on the assessment.
We have designed the Risk Ledger platform to make it easier and faster to respond to client security due diligence and assurance assessments.
By allowing suppliers to create and manage an account on the platform, Risk Ledger gives you a user friendly way to complete, evidence and maintain a comprehensive security assessment once and then easily share it with any other client who requests information about your security programme - eliminating the need to repeat this task for every client. Read more about how Risk Ledger works for suppliers here.
Once your assessment is completed, the Risk Ledger platform facilitates easy private communication between you and your client(s) about your assessment, eliminating long and confusing email trails while keeping you up to date with the status of your assessment with each client you are connected with on the platform.
As a security focused business, it is really important to us that your organisation and personal details are kept secure when you use the Risk Ledger platform. Multi-factor authentication (MFA) is one of the best ways to do this for any user account. You can read a bit more about why this is important in this article by the National Cyber Security Centre.
Switch to an Authenticator app:
If you prefer not to use a mobile number once signed up, you are able to go to your account "Settings" > "My Account" > "Configure 2FA" and connect your chosen authenticator app to the account. See this article for a list of Authenticator apps.
The Risk Ledger supplier assessment looks at risk controls implemented on an organisational level so a new profile should only be created if the security regime and management of security controls differs substantially between related legal entities or product/service lines. If there are slight differences in the implementation of security risk controls across a portfolio of products/services or between legal entities, this can be recognised in the contextual notes section of your response for the relevant risk controls.
Example - Group organisation with multiple subsidiaries
If an organisation is structured as a Group with multiple subsidiaries, each subsidiary should be able to share the same assessment on Risk Ledger if the Group manages security centrally with a Group CISO and information security resources, reflecting the fact that the security regime and its management should be the same or significantly similar across the Group.
If the subsidiaries have autonomous or semi-autonomous security leadership and independent security regimes, each autonomous subsidiary or cluster of subsidiaries sharing the same security leadership should complete their own assessment on Risk Ledger to reflect their independent security posture.
Example - An organisation has a portfolio of different products and services
If all products and service lines are developed and delivered under the same or a very similar security regime, you should be able to maintain one Risk Ledger supplier assessment to share with clients using any of your products or services. Where there are slight differences in the risk controls and policies implemented in the delivery of different products and services, you can highlight this in the contextual notes of the relevant risk controls or in direct discussions with your clients on the platform.
If your products and services are developed in distinct security environments, you should complete a new supplier assessment on Risk Ledger for each distinct security environment.
If you are unsure on how to proceed, please don't hesitate to get in touch with us directly and we'd be happy to help.
Yes, you can quickly add users to your account. To add users you will just need the email address of the colleague you would like to add.
To add a user navigate to your account Settings > Users > Add Users
Avoid adding users via shared or group email accounts.
You can provide access to the platform for multiple users by adding each one using a direct email address.
The assessment autosaves so multiple users can collaborate on the assessment at the same time without losing any progress.
The assessment is not in a pass/fail format and your answers will be compared with your clients' security policies . This allows you and your clients to have greater visibility of any gaps and to work collaboratively to remediate them.
Additionally, if you do answer 'No' to a question, you are able to add context to this answer in the notes section.
If one of your clients do require remediation of a security control, they can request this through the platform and you will be notified.
Yes, Risk Ledger allows you to switch between a Supplier and a Client view, meaning that you can switch between sharing your own assessment and running assurance on your own Suppliers. Get in touch with the team to find out more!
Suppliers, as a minimum, update their profile at least every 6 months and this is automated through the platform meaning at the very least you are receiving updates at least twice as much vs a manual method with zero effort on your side. Typically suppliers update their profile more often than this as they are connected with more than one customer, therefore updating their profile as they go through further reviews. Any update is communicated to you and any other client they are connected with. You are able to track any changes in the suppliers profiles in the activity tab and we send a weekly update on any change in any supplier profile. This also massively reduces the burden on re-reviews as you are constantly looking at accurate up to date information.
Yes it is a self assessment, it is an industry norm that self assessments are sufficient for supplier reviews as scanning tools cannot give us a view on internal security controls and onsite audits are over burdensome on both client and supplier resources meaning it is unfeasible to cover all vendors and impossible to continually monitor. Traditionally manual approaches also rely on self assessments but crucially are point in time assessments and are therefore out of date the moment you receive them. Taking the above into account, it therefore matters what the self assessment covers. That is why Risk Ledger has built our best in class Supplier Assessment Framework (mapping to ISO 27001, Nist800, NCSC CAF) focused on allowing the suppliers to demonstrate their specific security controls and evidence to support the client in understanding whether the supplier is appropriately complying with regulations and best practices. Risk Ledger then goes further with our unique network based approach then allowing clients to continually monitor those controls and giving visibility into 4th/5th/6th parties that is virtually impossible to achieve via any other method.
Yes, the suppliers need to be on the platform to assess 3rd parties and beyond which is why growing the network is a priority. We have onboarded over 1200 vendors from January - June 2023 alone, as a result, security professionals on Risk Ledger are constantly receiving insights beyond the 3rd party that they cannot receive via any other method. Recently, a high street bank, using Risk Ledger onboarded 14 suppliers in 2 days and immediately had visibility down to their 7th party and identified 7 previously unidentified concentration risks.
Yes, you can use our network visibility tool to demonstrate this to regulators very easily
Yes, our framework and approach is approved by UK government experts, you can learn more about how we help the public sector here.
Yes we do, you can learn more about our security standards on our security page
Our framework is agnostic and covers ISO, NIST, SOC2, GDPR & ESG to name a few
We rely on the power of the network to ensure that the data is accurate. Supplier profiles are being reviewed by multiple clients. Reviewing the data constantly helps ensure that it’s of a higher quality.
You set the thresholds of what is expected of your suppliers based on criticality or the data that they store. Alternatively, you can customize this as you see fit through bespoke policies
Risk Ledger gives you instant access to up-to-date information on all of your suppliers, go into the reporting tab and export the reports necessary to demonstrate your third-party risk processes.
You can get as specific as you need with our reporting functionality. You can show a holistic overview of your supply chain ecosystem, or access a more granular view of it and report on specific risk registers
We have a public API that you can use to connect to some GRC tools, however, it’s worth speaking to a member of the Risk Ledger team about your specific use case.
You can learn about what qualifies as an emerging threat here: https://riskledger.com/resources/increasing-response-security-threats.
Normally we publish one within 1 day of it becoming a major issue.
You can message your suppliers about potential security issues, however, we take responsibility for publishing a network wide threat.
You can use the discussion feature for any bespoke or follow-up questions for your suppliers. If you notice that a certain area or domain is not covered or needs more detail please let us know and we can look into expanding in the next update.
We take security really seriously - any supplier that joins Risk Ledger has the opportunity to review us. We have strict data protection policies that everyone has to follow, sign terms and conditions which govern a two way relationship between us and the supplier.
We are a data pipe that sits between client and supplier, it's not up to us to decide what's good enough for you, however, the fact that supplier profiles are being reviewed by multiple clients means that the data is of a higher standard than most platforms. We can provide a fully managed service through one of our partners if required.
Our framework is reviewed every 6 months. Our team looks at incoming regulations/industry trends and adjusts the framework accordingly. However, we see the framework as a collaborative effort and encourage the Risk Ledger community to suggest amendments. This 2 pronged approach is what ensures that our framework is up to date and is as robust as possible.
Risk Ledgers standardised framework is built to address a range of regulations so you shouldn’t need to add any questions. However, we review our framework every 6 months so if there are gaps please let us know and we can look into them.
Most likely yes! Our framework has been built with all the major certifications & assessment frameworks in mind. In addition, we are constantly reviewing it to ensure it’s up to date. If you want to check about a specific certification or framework please get in touch.
Ensuring the security of our platform and its users is central to what we do at Risk Ledger. We maintain strict security and confidentiality controls to ensure that your information remains secure. You can review Risk Ledger's security assessment yourself using the platform! Just request access by emailing support@riskledger.com.
Privacy:
The only data visible to organisations you are not connected with is your company’s name and the country it is registered in to allow connection requests to be sent and accepted.
Security:
For further information on our security and privacy policy please visit the below pages:
Over 60% of organisations have experienced a security breach caused by a third party and managing this risk has become mission critical to organisations in every industry.
Running a third-party risk management (TPRM) programme allows you to identify and understand the risks in your supply chain. Risk Ledger gives you access to real-time information directly from your suppliers in order to help you mitigate these risks and perform continuous due diligence on your suppliers.
Running a third-party risk management programme may be required by your clients or be a regulatory requirement in your industry. E.g. the NIS directive in the EU.
Risk Ledger provides the tools you need to run a comprehensive, security-led, third-party risk management programme against your entire supply chain.
The Risk Ledger platform is the only solution that moves away from point-in-time assessments and provides you with real-time, actionable data collected directly from suppliers - allowing you to continuously identify, measure and actively manage a comprehensive set of third-party risks at scale and for a low, per-supplier cost.
Our unique network model gives you visibility of supply chain risks beyond third parties to fourth, fifth and sixth parties too.
Using Risk Ledger helps you to increase supplier engagement with your third-party risk management programme by making it simple, free and fast for them to engage, respond and improve.
We have a tiered pricing model depending on the benefits you want to take advantage of and the size of your supply chain. For full information on our pricing please contact us.
Risk Ledger is free for suppliers, so when you invite an organisation to review they will not need to pay to respond or engage with you in any way.
Yes. It is not a problem if your suppliers are not already on the platform. On average it takes 10 business days from the time a supplier is invited to having a completed profile - much quicker than a manual process.
You can simply invite your suppliers to the platform using an email address, either individually or in bulk, and we will support the supplier(s) to onboard.
The number of suppliers maintaining a completed assessment on the platform is growing at an exponential rate so you will be able to connect with and review a good proportion of your third parties almost instantaneously.
As a security focused business, it is really important to us that your organisation and personal details are kept secure when you use the Risk Ledger platform. Multi-factor authentication (MFA) is one of the best ways to do this for any user account. You can read a bit more about why this is important in this article by the National Cyber Security Centre.
Switch to an Authenticator app:
If you prefer not to use a mobile number once signed up, you are able to go to your account "Settings" > "My Account" > "Configure 2FA" and connect your chosen authenticator app to the account. See this article for a list of Authenticator apps.