Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

SecurityScorecard: Don’t Just Guess, Score Your Supply Chain

Truth in IT
05/09/2025
79
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025. We are going around and talking to all the most exciting cybersecurity vendors. One of the hot topics that I've been noticing is how do you secure your supply chain? There's a couple different interpretations of supply chain, but we have Jason here today from Security Scorecard, who's going to start to tell us about what you guys do about securing supply chains. First, just explain a little bit about what kind of supply chains we're talking about. Sure. We're talking about the vendors that organizations typically bring in to do business with their organization as part of a new vendor. You generally have to fill out a questionnaire and be assessed in order to become a new vendor to an organization. So we're talking about the collection of all the known vendors that an organization has, and how to understand the cyber resilience of them, and how to identify which are the most risky, which are most likely to cause a breach. Now, I've been around this community a lot, and it does seem like compliance covers some of that, where you ask all your vendors to fill out forms and certify that they do certain different activities, that they do data protection, and that they have other things. Is that kind of what you're scoring? Uh, not exactly. So we've actually pivoted from that. Essentially, we help organizations identify what the actual likelihood of breach is for an organization. So with a questionnaire, oftentimes you talk to a CISO here and a questionnaire will say they'll say a questionnaire never stopped a breach. And the reality is it's a point in time assessment, self-attestation, if you will, of your compliance with regulations or a framework. What we're doing is not trusting essentially what people self attest to. And we're helping organizations get an idea of what's really exploitable at any given time. And this goes up so so in the supply chain there's organizations above you and below you. Does a particular company that wants to do this have to enroll those organizations directly in the program? No. So we start by understanding the entire attack surface. So for our customer call it Bank of America. We want to understand how many vendors they're doing business with. Typically they may not understand all of the vendors that they are. So we give them with automatic vendor discovery, we give them a better view of the entire attack surface of their supply chain. And then we're going to give them some tiering recommendations. Oftentimes they tier based off whether they're sharing data or how important it is to the continuity of the business. But we look at it from a likelihood of breach standpoint. So we give them a risk scoring associated with how likely it is that these vendors are to be breached. And then we help them remediate. So we do entire attack surface. We use threat intelligence to help contextualize or understand or prioritize what's most exploitable and being used by threat actors today. And then we help remediate by actually doing vendor callouts and actually giving them targeted tasks to go close. All right. So someone's using this scorecard. It's kind of like for this CISO reporting to the board of directors. Or is it a lower level kind of scorecard that's used more monthly, operationally or even tactically? I'm getting I'm getting the impression this is a little bit more coming down the stack. It's absolutely coming down the stack. So security ratings have existed for a long time. We've been we have been a data platform providing security ratings for 12 years. We're a leader in the magic, all the magic quadrants for ratings. But at the end of the day, ratings are just a tool. It's like a credit score. It's tells a bank roughly, right, how how credit worthy you might be, but it's not the basis of which they're going to offer you $1 million for, you know, to lend for your for your home. So what we've done is we've turned ratings on its on its head. Instead of just giving you an idea of how cyber resilient you are as a tool, so that you can then go manage your own vendor network, we're actually helping as a managed service, manage vendors ourselves, and instead of just reporting to the board, this is how many vendors we have with this kind of score. We're actually operationalizing it into real time. So being able to understand what to do right now in order to change. So it's a SoC mindset, if you will, to an age old problem of cyber resilience. Right. Really extending that SOC, which has traditionally been inward looking or at least perimeter facing to something that's helping you look both up and down. I mean, people are just extending not only to the edge with their remote workforce and IoT and all sorts of that. But when we look at the number of SaaS apps that are being used, the number of third parties developing software, AI coming along, embedding AI models, huge risk factor. Probably. Exactly. And when you talk to a CISO, they'll say, we have a very good handle on how to do the four walls in XDR and all the combination of a number of tools have given them really good visibility to what's anomalous in the four walls. And with cloud security, with applications, payloads, APIs going to the cloud, Wiz and other companies have helped organizations evolve cloud detection and response so they can understand what's maybe misappropriated or what, what permissions are in place or open open ports or whatnot. What we're doing is we're taking the Wild West approach. We're basically saying the things they want to control and have gotten better at controlling. They can't control with the supply chain. And so we're giving them visibility and actionability on this entire third, fourth and ninth party. Uh uh uh uh uh. Sea of vendors. Yeah. I mean, that that that supply chain could go on for any number of generations, so to speak, up and down. Right. So. So if a CISO says I can't control I periodic self-attestation like a questionnaire is not protecting me. If I can't control that vendor, how can I control their vendors? Right. And so we're giving that sort of extended extended visibility and actionability on what we believe is the most exploitable. Uh, if. You looked around at this show and there's a lot of people at this show and you want to give them one really good piece of advice on what to do, uh, vis a vis, uh, getting a hand on the supply chain. What would that be? It's to get. The traditional third party risk management team, which oftentimes reports to A to a to legal or GRC, or they report to risk or purchasing even to get that person in the same room with a SoC and ask them some very basic questions. How confident are you that the traditional questionnaire assessment process makes you safer for an organization? How confident are you that you know how many vendors are actually exposing you to risk? Is this hard to get people who are focused on compliance, to talk to people who are focused on monitoring in the SOC? It's almost a question you don't have to answer because we know it's hard. No, it's it's amazing actually getting them to talk to one another. They understand that there's a massive gap between them. They can only bridge it usually with more and more people, or they try and bridge it with with AI or some other form of automation. But there truly is a better path to operationalizing third party risk in the same way that a CISO would operate operationalize their SOC. Right. And you really have to bring security into almost a real time mindset to have any effect. Today. Things are just moving so fast. The threat's evolving fast zero days. So oftentimes averaging a zero day a week now right. And the third party, the board wants to know this new zero day that I just read about on the news. How does that how how many third parties have that. I almost want to say like, how do you multiply zero by anything, right? That's exactly. Right. So we can we can produce actionable, um, plan based on a zero day as soon as, as soon as there's a check for it, as soon as there's a check from a hacker's mentality on a vulnerability in a zero day vulnerability, we can report back right away which vendors are are affected by that, and we can begin the course of action. Traditionally, that means you you trigger an audit or you trigger an assessment or you send a questionnaire. For us, it's very targeted feedback that we're giving them. And one of the things that I think is really interesting is we now have so many customers under our managed service that we have commonality with vendors. So if there's a zero day affected by one of these companies, that's a third party vendor to our customers, we can go after them with a with a different buying power, if you will, to getting them to fix or remediate this issue. So I mean, that's 12 of your customers have the same issue with you, which is this CVE is is available on this unpatched server at this time being exploited by this threat actor. I mean, that's interesting that you start to graph out the supply chains for many different organizations and they start to web together. Well, we call it we call it a clearinghouse model. And we continue to evolve on this. But the idea is that oftentimes the companies don't even know who to reach out when they do want to reach out, like so a zero day comes along, they don't know who the current contact is for that vendor that they have. Right. Because they last time they contacted him was when they sent him a questionnaire 14 months ago. And so we are acting as a clearinghouse for remediation of third party risk. I mean, that's awesome. I think we could talk about this for hours yet, Jason. Thank you. But if someone wants to learn a bit more about what you guys are up to, you've got a website or some resource. Securityscorecard .io. M y name is Jason Doris. Jason.Doris@securityscorecard.io. All right. Mike Matchett from Small World Big Data. See you at the next booth. Take care.

Mike Matchett speaks with Jason Doris of SecurityScorecard about rethinking vendor risk management. Instead of relying on stale, self-attested questionnaires, their platform offers real-time ratings of an organization’s breach likelihood based on actual telemetry. With threat intelligence, attack surface mapping, and a ‘clearinghouse’ model for remediation, SecurityScorecard turns third-party risk into a measurable, manageable process. Because a signed form doesn’t stop a zero-day.

Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • cybersecurity
  • security
  • scorecard
  • third-party
  • risk
  • vendor
  • management
  • supply
  • chain
  • security
  • security
  • ratings
  • breach
  • likelihood
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: SecurityScorecard: Don’t Just Guess, Score Your Supply Chain

              Upcoming Webinar Calendar

              • 10/30/2025
                06:00 AM
                10/30/2025
                Rethink secure access solutions for the zero trust paradigm beyond VPN and NAC.
                https://www.truthinit.com/index.php/channel/1547/rethink-secure-access-solutions-for-the-zero-trust-paradigm-beyond-vpn-and-nac/
              • 10/30/2025
                12:00 PM
                10/30/2025
                Essential Strategies for a Swift and Stress-Free Audit Process
                https://www.truthinit.com/index.php/channel/1610/essential-strategies-for-a-swift-and-stress-free-audit-process/
              • 10/30/2025
                12:00 PM
                10/30/2025
                Rethinking secure access in a zero trust environment beyond VPN and NAC
                https://www.truthinit.com/index.php/channel/1546/rethinking-secure-access-in-a-zero-trust-environment-beyond-vpn-and-nac/
              • 11/12/2025
                12:00 PM
                11/12/2025
                Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR
                https://www.truthinit.com/index.php/channel/1545/zendesk-customer-spotlight-pure-insurance-how-to-scale-employee-service-from-it-to-hr/
              • 11/12/2025
                10:00 PM
                11/12/2025
                Transforming AI Buzz into Tangible Business Value with Druva AI
                https://www.truthinit.com/index.php/channel/1555/transforming-ai-buzz-into-tangible-business-value-with-druva-ai/
              • 11/13/2025
                05:00 AM
                11/13/2025
                Transforming AI Buzz into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1554/transforming-ai-buzz-into-tangible-business-value-with-druva/
              • 11/13/2025
                12:30 PM
                11/13/2025
                Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls
                https://www.truthinit.com/index.php/channel/1536/insights-from-a-certified-cmmc-assessor-sidestepping-common-assessment-pitfalls/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Maximize Business Value with Druva AI: Transforming Buzz into Profits
                https://www.truthinit.com/index.php/channel/1556/maximize-business-value-with-druva-ai-transforming-buzz-into-profits/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Human Security: Strategies to Combat Click Fraud: Innovations from LinkedIn and HUMAN for Budget Protection and Enhanced Campaign Performance
                https://www.truthinit.com/index.php/channel/1583/strategies-to-combat-click-fraud-innovations-from-linkedin-and-human-for-budget-protection-and-enhanced-campaign-performance/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook
                https://www.truthinit.com/index.php/channel/1579/microsoft-advanced-group-policy-management-agpm-end-of-life-your-practical-migration-playbook/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Human Security: Fostering Trust in the Age of Agentic Commerce
                https://www.truthinit.com/index.php/channel/1582/fostering-trust-in-the-age-of-agentic-commerce-through-human-dialogue/
              • 11/20/2025
                11:00 AM
                11/20/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 11/20/2025
                12:00 PM
                11/20/2025
                360View: Budget Optimization: Doing More with Less
                https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
              • 11/20/2025
                12:00 PM
                11/20/2025
                Next Steps After CMMC Certification: Strategies for Ongoing Compliance and Maintenance
                https://www.truthinit.com/index.php/channel/1558/next-steps-after-cmmc-certification-strategies-for-ongoing-compliance-and-maintenance/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Collaboration
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-collaboration/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Upcoming Spotlight Events

              • Nov
                18

                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                11/18/202501:00 PM ET
                More events

                Upcoming Industry Events

                • Oct
                  30

                  Rethink secure access solutions for the zero trust paradigm beyond VPN and NAC.

                  10/30/202506:00 AM ET
                  • Oct
                    30

                    Rethinking secure access in a zero trust environment beyond VPN and NAC

                    10/30/202512:00 PM ET
                    • Nov
                      12

                      Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR

                      11/12/202512:00 PM ET
                      More events

                      Upcoming 360 View Events

                      • Nov
                        20

                        360View: Budget Optimization: Doing More with Less

                        11/20/202512:00 PM ET
                        • Dec
                          18

                          360View: 2026 IT Predictions & Emerging Trends

                          12/18/202512:00 PM ET
                          More events

                          Recent Spotlight Events

                          • Oct
                            22

                            Cut Ticket Resolution Time in Half with Smarter IT Documentation

                            10/22/202501:00 PM ET
                            • Oct
                              15

                              Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                              10/15/202501:00 PM ET
                              • Sep
                                16

                                KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                09/16/202501:00 PM ET
                                More events

                                Recent Industry Events

                                • Oct
                                  29

                                  Practical Strategies for Platform Engineering in the AI Era

                                  10/29/202512:00 PM ET
                                  • Oct
                                    28

                                    Reimagining Data Security: Regain Your Control and Confidence

                                    10/28/202512:00 PM ET
                                    • Oct
                                      23

                                      Secureframe: CMMC Series - Crafting a Readiness Roadmap for Streamlined Certification Success

                                      10/23/202512:00 PM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version