Third-Party Cyber Risk Management Maturity Quiz
YOUR SCORE IS IN THE BOTTOM THIRD OF THE PARTICIPANTS AND INDICATES YOUR PROGRAM IS: BASIC
Your third-party cyber risk management program is just getting off the ground. It is most likely spreadsheet based, ad-hoc and has much room for improvement. You have a high risk of exposure from your third parties.
Work on your program maturity with a copy of our eBook, "Mitigate Third-Party Cyber Risk Exposure"
YOUR SCORE IS IN THE MIDDLE THIRD OF THE PARTICIPANTS AND INDICATES YOUR PROGRAM IS: EMERGING
Your third-party cyber risk management program is improving. You are driving automation in some areas, but most tasks are still manual. You likely have little visibility into the risk from your entire third-party ecosystem, are still using "shared spreadsheets" and are not correlating threat intelligence to weak controls. You have medium risk of exposure from your third parties.
Work on your program maturity with a copy of our eBook, "Mitigate Third-Party Cyber Risk Exposure"
YOUR SCORE IS IN THE TOP THIRD OF THE PARTICIPANTS AND INDICATES YOUR PROGRAM IS: OPTIMIZED
Congratulations! Your third party cyber risk management program is in the top third of programs. You are leveraging technology to automate many of the functions and have visibility into the risk from your entire third party ecosystem. You are not using "shared spreadsheets" and are correlating threat intelligence to weak controls. You have a low risk of exposure from your third parties.
Work on your program maturity with a copy of our eBook, "Mitigate Third-Party Cyber Risk Exposure"