Research Findings
Showing 11 matching figures from this chapter. See all 33 figures in this chapter.
Figure 6. Why Organizations Believe Cyber Supply Chain Security Is Becoming More Difficult
Figure 6. Why Organizations Believe Cyber Supply Chain Security Is Becoming More Difficult
Figure 7. Most Important Security Considerations During Product Evaluation and Purchasing Processes
Figure 7. Most Important Security Considerations During Product Evaluation and Purchasing Processes
Figure 8. Audits of Strategic Suppliers
Figure 8. Audits of Strategic Suppliers
Figure 9. Internal Groups Responsible for IT Vendor Security Audit Processes
Figure 9. Internal Groups Responsible for IT Vendor Security Audit Processes
Figure 11. Current IT Vendor Security Audit Process
Figure 11. Current IT Vendor Security Audit Process
Figure 13. Respondents Rate IT Vendors’ Commitment to/Communications about Internal Security Processes and Procedures
Figure 13. Respondents Rate IT Vendors’ Commitment to/Communications about Internal Security Processes and Procedures
Figure 19. Security Activities Included as Part of the Software Development Process
Figure 19. Security Activities Included as Part of the Software Development Process
Figure 22. Plans to Include Security Activities as Part of the Software Development Process
Figure 22. Plans to Include Security Activities as Part of the Software Development Process
Figure 29. Groups Responsible for Security Policies and Safeguards for Interaction with Third Parties
Figure 29. Groups Responsible for Security Policies and Safeguards for Interaction with Third Parties
Figure 30. Establishment of Security Policies and Safeguards for Interaction with Third Parties
Figure 30. Establishment of Security Policies and Safeguards for Interaction with Third Parties
Figure 33. Suggested Actions for the U.S. Federal Government with Regard to Cybersecurity
Figure 33. Suggested Actions for the U.S. Federal Government with Regard to Cybersecurity