Six Degrees of Kevin Bacon

October 31, 2019
White Papers

Vendor Cyber Risk: A High-Stakes Version of “Six Degrees of Kevin Bacon”

How do you connect Kevin Bacon to Oprah Winfrey? It’s obvious: Oprah was in A Wrinkle in Time with Chris Pine who was in Beyond All Boundaries with Kevin Bacon. What about… Fred Astaire? Simple! Astaire was in The Towering Inferno with Robert Wagner who was in Wild Things with Kevin Bacon. But what does that have to do with supply chain and risk management? That subject and the popular Hollywood trivia game are about surprising and unexpected connections. Read this eBook to learn how unknown connections can pose unexpected cyber risks and what you can do to get proactive about mitigating those risks and securing your supply chain

Read this ebook to learn:

  • How hidden vendor connections pose security risks
  • The cost of leaving those risks unmitigated
  • How you can start to address vendor-created cyber risk

View next

Ensure Operational Resilience

Request Contact

Build operational resiliency into your extended supply chain:

  • 889 compliance – ensure market access
  • Data sharing with 3rd parties and beyond – protect reputation
  • Concentration risk – ensure business continuity
  • Cyber breaches – assess potential exposure
  • Unethical labor – avoid reputational harm
  • On-boarding and monitoring suppliers – save time and money