Genom att klicka på ”Acceptera” godkänner du lagring av cookies på din enhet för att förbättra webbplatsnavigering, analysera webbplatsanvändning och hjälpa till i våra marknadsföringsinsatser. Se vår
Sekretesspolicy
för mer information.
Förneka
Acceptera
Sekretessinställningar
Viktiga kakor
Obligatorisk
Marknadsföringscookies
Väsentligt
Personaliseringscookies
Väsentligt
Analytiska cookies
Väsentligt
Avvisa alla cookies
Tillåt alla cookies
Spara inställningar
Lösning
Lösningar
Förbättra din process
Centralisera leverantörens säkerhetsprofiler
Leverantörens due diligence
Få tillgång till stor befintlig leverantörsbas
Leverantörens due dil
Automatisera poängsättning baserat på policyer
Visualisera risker
Nionde part- och koncentrationsrisker
Rapportera och övervaka
Svara på nya hot
Användningsfall
Förstå leverantörssäkerhet
Säkerställa regelefterlevnad
Certifiera leverantörsstandarder
Effektivisera rapporteringen
Hantera ett intrång från tredje part
Samhällen
Offentlig sektor
Kritisk nationell infrastruktur
Finansiella tjänster & Försäkring
Insurance
Teknik
Utvalda fallstudier
Se alla fallstudier
Medel
Medel
Resurscenter
Navet för alla resurser
Akademin
Lär dig riskhantering i försörjningskedjan
Forskning & Analys
Blogginlägg, rapporter, vitböcker, analys
Fallstudier
Kundupplevelser med Risk Ledger
Nyheter
Företags- och produktuppdateringar
Händelser
Webinarier och kommande evenemang
Typer
Förklaringar och guider
Nya hot
Ingenjörsvetenskap
Djupa dyk
Rapporter om datainsikter
Analys
Aktuell rapport
Se alla rapporter
Stöd
Hjälp
Hjälpcenter
Allt stöd på ett ställe
FAQ
Vanliga frågor
Produktuppdateringar
Nyheter & ändringslogg
Changelog
What's new
Kundsupport
Få tillgång till teknisk support
Plattform
Leverantörer
Bedömningsram
Logga in
Framväxande hot
ToolShell On-Prem SharePoint Vulnerabilities: Emerging Threat Published on Risk Ledger
Se alla hot
Företag
Om
Om oss
Berättelsen om Risk Ledger
Karriärer
Life at Risk Ledger
Medietillgångar
Presscenter
Kontakta oss
Prata med rätt personer
Info
Sekretesspolicy
Användarvillkor
Säkerhetsprofil
Utvalda nyheter
Se alla nyheter
English
Finnish
Swedish
Norwegian
Danish
Logga in
Boka en demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Framework Domains
Supplier Assessment Framework
A
Security Governance
B
Security Certifications
C
HR Security
D
IT Operations
E
Software Development
F
Network and Cloud Security
G
Physical Security
H
Business Resilience
I
Supply Chain Management
J
Data Protection
K
Artificial Intelligence
XA
Financial Risk
XB
Environmental, Social and Governance
Domain
J
Data Protection
This domain covers compliance with data protection legislation.
20) Does your organisation have an internal audit function that ensures information security requirements are being met by the business?
Answer yes if you have an internal team who audit your security function against your policies to ensure compliance. Please comment on the frequency of the audits in the notes.
05) Are you PCI DSS compliant?
Answer yes if your organisation is compliant with the PCI DSS security standard. If you have answered no, please state whether or not you process, store or transmit payment card data. If you have certified against the standard, please provide your certificate.
01) Does your organisation perform background checks on staff and contractors?
Answer yes if background checks are conducted against staff before they join your organisation. In the notes section, please outline the types of checks (e.g. employer reference, criminal records, BPSS, CTC, SC, DV) conducted for which roles or provide a supporting document (as a PDF file) as evidence.
04) Is there a formal disciplinary process for employees who have breached company policy (including any breaches of company security policy)?
Answer yes if your organisation has a formal disciplinary process that is followed if an employee is found to have intentionally breached company policy. Please provide a document outlining the process (as a PDF file) as evidence (this may be covered by your organisation's Disciplinary Policy).
07) What are your scope 1 emissions (tonnes of CO2 equivalent per year)?
Please enter the most recent measurement for your scope 1 emissions in tonnes of CO2 equivalent. Please state when this was last measured and provide further information on the scope and method of measurement, if applicable, in the notes section. If you do not measure scope 1 emissions, please enter zero as your numerical answer and state this clearly in the notes section.
08) What are your scope 2 emissions (tonnes of CO2 equivalent per year)?
Please enter the most recent measurement for your scope 2 emissions in tonnes of CO2 equivalent. Please state when this was last measured and provide further information on the scope and method of measurement, if applicable, in the notes section. If you do not measure scope 2 emissions, please enter zero as your numerical answer and state this clearly in the notes section.
09) What are your scope 3 emissions (tonnes of CO2 equivalent per year)?
Please enter the most recent measurement for your scope 3 emissions in tonnes of CO2 equivalent. Please state when this was last measured and provide further information on the scope and method of measurement, if applicable, in the notes section. If you do not measure scope 3 emissions, please enter zero as your numerical answer and state this clearly in the notes section.
Defend against supply chain attacks with Defend-As-One.
No organisation is an island.
Boka en demo
Churchill House, 142-146 Old St
London, EC1V 9BW
Storbritannien