Who's Accessing Your Network Through Your Digital Supply Chain? - Ascent Conference

Who’s Accessing Your Network Through Your Digital Supply Chain?

Situational awareness is a hot buzzword currently making its way through the cybersecurity community. But what exactly does situational awareness entail, and how is it related to future-proofing your businesses operations? 

While there are many formal definitions for situational awareness, it basically boils down to this: companies need to understand the environment in which they operate, the impact that the environment has on their operational capabilities, and what the company can do to respond to these environmental factors. Within cybersecurity specifically, this means having a thorough understanding of your own IT infrastructure, the types of attacks that are commonly taking place, and your company’s ability to protect its infrastructure from those threats.

Given the lightning-fast speed of today’s cyberattacks, understanding your operating environment is more crucial than ever. If you don’t understand the threat landscape before an attack, it will be too late to learn about it after an attack has taken place.

Understanding Potential Threats in Your Digital Supply Chain

For decades, businesses have been using virtual fortresses to protect their data and systems. Using tools like firewalls, multi-factor authentication, and zero trust frameworks — all overseen by dedicated cybersecurity teams — companies have created digital castles to protect their most sensitive data.

However, as the SolarWinds attack has shown, even the most well constructed fortresses still have entrances. And if you’re not guarding these entrances properly, hackers can walk right through them. Your software supply chain creates an abundance of third-party risks to your network security  — and your network is only as strong as its weakest link. When your organization shares its data and network access with third-party vendors to provide additional services, that party’s security (or lack thereof) presents a potential vulnerability. This is where situational awareness comes into play.  

Using Situational Awareness to Protect Your Organization From Supply Chain Threats

In order to defend against supply chain threats, you need to understand not only how your own network is vulnerable, but what your suppliers’ vulnerabilities are as well. You need to understand how those vulnerabilities are being exploited by hackers, and the range of options available to you and your suppliers for a response.

Vendor risk management depends on an ever-evolving set of tools to paint a clear picture of what’s going on in your supply chain. Your company should start by identifying who your vendors are, and what, specifically, they provide you with. You’ll then want to develop security standards that are specific to your organization, and initiate a compliance program for vendors with access to your data or networks. As part of this program, questionnaires present a helpful method of assessment. That being said, questionnaires are only as helpful as the information people choose to share. So as the old expression goes, make sure to “trust, but verify.” Continuous monitoring tools are one way to verify compliance, as are penetration tests that actively seek to defeat a vendor’s cyber defenses. But ultimately, each firm should have a tailored approach based on its own needs — there is no single solution to this complex problem. Fortunately, experts like RiskRecon can support companies who have made the decision to take Vendor Risk Management seriously.

Final Thoughts

Pursuing situational awareness will surface underlying issues and increase the visibility of your supply chain so that any vulnerabilities can be quickly and accurately addressed. And as your awareness grows, your responses will need to adapt, and your relationships with vendors will need to change. Failure adapt will result in significant vulnerabilities that attackers can — and will — exploit.

Why do companies spend money on third-party risk assessment? Watch our full-length Spotlight on Cybersecurity to find out why!

Photo by Adi Goldstein on Unsplash

Privacy Notice

This privacy notice discloses the privacy practices for (www.ascentconf.com). This privacy notice applies solely to information collected by this website. It will notify you of the following:

  • What personally identifiable information is collected from you through the website, how it is used and with whom it may be shared.
  • What choices are available to you regarding the use of your data.
  • The security procedures in place to protect the misuse of your information.
  • How you can correct any inaccuracies in the information.

Information Collection, Use, and Sharing

We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.

We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request, e.g. to ship an order.

Unless you ask us not to, we may contact you via email in the future to tell you about specials, new products or services, or changes to this privacy policy.

Your Access to and Control Over Information

You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:

  • See what data we have about you, if any.
  • Change/correct any data we have about you.
  • Have us delete any data we have about you.
  • Express any concern you have about our use of your data.


We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.

Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for “https” at the beginning of the address of the Web page.

While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.

If you feel that we are not abiding by this privacy policy, you should contact us immediately via telephone at 202-256-9707 or [email protected].