A close up look at the implementation of IT Operations security risk controls across the supply chain ecosystem.
Risk Ledger Insight Reports put the spotlight on third-party risks and how they are managed in the supply chain. Subscribe at the bottom of this page to receive each report directly in your inbox.
This edition takes a close up look at the implementation of IT Operations risk controls across the supply chain ecosystem using the aggregated and anonymised data shared on the Risk Ledger platform by nearly 1000 organisations who have completed Risk Ledger's standardised Supplier Assessment Framework (SAF).
The report includes statistics on all 35 risk controls in the IT Operations risk domain in the SAF covering patch management, asset management, authentication, identity and access management, email security, mobile device management, encryption and operational security.
Highlights include the surprisingly high proportion of organisations that allow employees to access sensitive company data on mobile devices without enforcing passwords on the device or having the ability to wipe it if it is compromised.
The report is essential reading for senior information security, procurement and IT managers concerned with managing risks in the supply chain.
Subscribe below to receive the report directly into your inbox along with our recent reports looking at data protection risks and security governance risks in the supply chain.
Sign up to our monthly newsletter to receive exclusive research and analyses by our experts, the latest case studies from our clients as well as guides, explainers and more to turn your supply chain risk management programme into a resounding success story.