ThirdPartyTrust Blog

The White House's Cyber Policy Impact on the Digital Supply Chain

Posted by Jeffrey Spetter on 5/19/17 11:30 AM
Find me on:

       If you missed it, President Donald Trump signed an Executive Order to implement improved cybersecurity practices at the federal level including networks, critical infastructure and the Nation. The cyber community has mostly been pleased with the outlined plan to bolster the nations security posture and focus on protecting against cyber attacks.


       ThirdPartyTrust took a deeper dive into the Executive Order to better understand the impact on vendors and the digital supply chain. The order mentioned vendor risk, specifically, in the "Findings" section and it reads: 

"Known vulnerabilities include using operating systems or hardware beyond the vendor's support lifecycle, declining to implement a vendor's security patch, or failing to execute security specific configuration." 

       With growing vendor relationships and sharing data becoming more prevalent, enterprises need to address a whole new set of problems. According to the Bomgar Survey of 608 IT professionals, on average 181 third parties access your network a week. That's more than double the number from 2016. A new approach is needed to assess digital supply chain risk and here at ThirdPartyTrust, we believe a network approach is best suited to tackle this risk.  

       The White House is also emphasizing other topics in this executive order like workforce development, accountability and access to shared resources and technology. It's a push to unify information sharing and technology resources across departments, which is an area in desperate need of attention. As the recent, alleged NSA-caused cyber attack proves, appropriate information sharing within governments, government allies and enterprises needs to happen to build a foundation for a better cyber security defense.  

Topics: Regulation

ThirdPartyTrust is a vendor risk management platform strengthening cyber risk intelligence and simplifying the management process for enterprises performing vendor risk assessments.
By analyzing both third and fourth party vendor cyber risk using a network-based solution, like 3PT, trust is built and mapped within your vendor eco-system.

Subscribe to Email Updates

Recent Posts