Validating vendor-reported security practices
While questionnaires and self-assessments are valuable, vendors typically present an optimistic view of their security posture in their responses. Leveraging Bitsight’s extensive, external data surfaced in Continuous Monitoring, Zekelman can verify vendor claims against vendor responses for a complete, confident view of risk.
When discrepancies do arise, Kehoe can initiate evidence-based discussions about actual security measures and necessary improvements. “It gives me evidence to back up what my gut is telling me about a vendor’s security practices,” Kehoe said. “When I see vulnerabilities or other data points that contradict what a vendor has told us, we can have a real conversation about their security posture and get honest answers.” This is particularly important for vendors who don’t provide visibility into the inner workings of their technology. “Some vendors operate as a closed box, where they install their own software, hardware, and networking gear,” Kehoe noted. “Bitsight helps us ensure that they’re doing what they need to do to protect us.”
Increasing collaboration with business stakeholders
The fact that the Zekelman Industries security team can run vendor cybersecurity assessments earlier and more quickly has also enabled more collaborative relationships with internal stakeholders. With Bitsight VRM, the security team can get immediate access to risk and exposure insights even before running a complete assessment, saving time for everyone involved. As a result, key business teams like marketing and HR now proactively engage with security early in the vendor selection process, knowing that they’ll quickly receive initial feedback on whether a potential vendor will be a good fit.
These collaborative efforts lead to better outcomes for the business teams as well, by identifying vendors who may or may not have risk issues early on.. This has changed the perception of the security team in meaningful ways. “I’ve never been able to achieve that kind of stakeholder engagement before,” Kehoe said. “They see me as a resource who can help them rather than a roadblock in their way.”
Prioritizing internal security investments for maximum impact
In addition to being the foundation of Zekelman Industries’ third-party risk management program, Bitsight also plays an important role in the company’s internal security efforts. The view that Bitsight provides of the company’s external attack surface helps the security team identify the most likely targets for threat actors and proactively mitigate the highest-priority risks.
“Bitsight helps us understand what makes us a target and where we need to focus our security efforts,” Kehoe said. He cited the company’s recent implementation of a new security information and event management (SIEM) system as a notable example. “Bitsight’s insights helped us prioritize monitoring for the systems that were most likely to attract unwanted attention,” he noted.