From Independent Firefighting to Collective Resilience: Get Started with Risk Ledger in 3 stepsFrom Independent Firefighting to Collective Resilience: Get Started with Risk Ledger in 3 steps

In today’s interconnected economy, supply chains are only as strong as their weakest link. 

With today’s vast, complex and active supplier networks, you can build the strongest perimeter defences and contract with the most security-focused suppliers, but still suffer from nth party vulnerabilities, concentration risks and cascading supply chain breaches. 

This is why organisations are shifting toward network-first supply chain security models.

As modern supply chain security is a collective defence problem, Risk Ledger has designed an Active Supply Chain Security-focused platform that helps you and your suppliers to defend-as-one. 

Here’s how you can get started in three easy steps. These steps reflect how organisations operationalise the shift from fragmented TPRM toward a more connected and continuous supply chain security model.

1. Set up your account

  • Create a client account. Add in company details, input access settings and set up MFA in just five minutes. Learn more here.
  • Add internal users. Add the job titles that will use the Risk Ledger platform (i.e. Cyber Security Analyst and Information Security Manager) and assign roles (i.e. editing security assessments and approving security profiles). Learn more here
  • Set up your supplier tags. Tag your suppliers based on three categories: Criticality, Confidentiality, PII (Personally Identifiable Information). These tags will determine the risk requirements for a specific supplier and drive the policies that align with their assessment. Learn more here.
  • Set up custom properties. Define the supplier context that matters to you and your team (i.e. contract renewal dates or contract value for a particular supplier). This helps you access the right data when reviewing your entire supplier base. Learn more here.
  • Create supplier labels. Apply custom labels to your suppliers to improve filtering, reporting and your policy setup on different groups of suppliers. Learn more here.
  • Create and edit policies. Create policies that contain the security controls you require different suppliers to have implemented (i.e. ‘Critical’ suppliers might need different compliance controls to suppliers that hold PII). Learn more here.

2. Connect with suppliers

  • Invite suppliers to Risk Ledger. If new or existing suppliers are not on Risk Ledger (most organisations find 20% of their suppliers are already on the platform - rising to 80% in some supply chains), simply ‘Create Supplier’ on the platform, add in basic company details and send an email invite for them to join. Learn more here.
  • Connect with existing suppliers on Risk Ledger. If a supplier you wish to review already has an active profile on Risk Ledger, simply send them a connection request. Learn more here.
  • Apply policies to your suppliers. Assign supplier tags to automatically calculate a compliance score (this measures how many of the security controls listed in a supplier profile correspond with your policy requirements). Learn more here.
  • Raise remediation issues directly. If a supplier does not have the required security controls in place, send a remediation request to review the requirements and make any required updates by a certain date. Learn more here.
  • Approve assessments. Once you have reviewed a supplier on Risk Ledger, either approve (or reject) the assessment or send an approval request to a colleague via email with your recommendation based on the review. Learn more here.

3. Coordinate supply chain risk response 

  • View all supply chain risks in one place. View supply chain risks for all of your connected suppliers within the Risks dashboard. Learn more here
  • Manage supply chain risks. Assign users and risk owners to emerging threats, and add updates and action plans to the Risk. All Risks have their own activity log, which shows all the changes that have occurred (for simplified compliance). Learn more here
  • Communicate with your suppliers. Start a discussion regarding the Emerging Threats with your supplier. This discussion will keep all conversations and updates in one place, and maintain a log. Learn more here.
  • Close the Risk. Once the appropriate action has been taken to resolve the threat (i.e. the supplier remediates the problem), close the Risk. The open and closed status of each Risk will help you report progress that has been made to reduce supply chain risk. Learn more here

Defend-as-one with Risk Ledger’s ASCS platform

By standardising supplier data, mapping thousands of organisations onto a living network, and overlaying proactive threat intelligence, Risk Ledger’s four-stage Active Supply Chain Security approach helps organisations strengthen resilience and progressively move towards defending as one.

After getting set up on the platform, you will be able to:

Book a call to see how your organisation can accelerate this transition

Blog

Download for free

By submitting this form, you agree to Risk Ledger’s Terms of Service, Privacy Policy, and Risk Ledger contacting you.

Thank you!
Download
Oops! Something went wrong while submitting the form.
Blog

Download for free

Download
Pattern Trapezoid Mesh

Get the security manager's briefing

Monthly research, case studies and practical guides you won't find anywhere else.

Join thousands of security managers turning their TPRM programmes into success stories.