You are on page 1of 27

TRADES:

A Framework
for Modern
Third-Party and
Supply Chain Risk
Management

G ove r n a n c e . R i s k . C o m p l i a n c e .
TABLE OF CONTENTS
Introduction: From Niche to Table Stakes in 18 Months..................................................... 2

A Rapidly Emerging Mandate for a New Risk Management Regime................................ 3

The Modern Risk Landscape................................................................................................. 6


Inherent Risks.............................................................................................................................. 7
Imposed Risks.............................................................................................................................. 10

TRADES: The Essential Elements of a Modern Enterprise


Third-Party and Supply Chain Risk Management Framework........................................... 13
Transparency of Current State................................................................................................ 14
Risk Methodology Design......................................................................................................... 15
Assess Current Risks.................................................................................................................. 16
Determine Mitigations................................................................................................................ 17
Evaluate Framework Uplift....................................................................................................... 18
Supplier Monitoring.................................................................................................................... 18

Implementing TRADES with Supporting Operational Methodology................................ 19

The SCRM Maturity Model: Implementing TRADES Framework at Any


Maturity Level to Reach a Reasonable Level of Capability................................................ 21

A Framework for the Future.................................................................................................. 23

FROM NICHE TO TABLE STAKES IN 18 MONTHS


Over the past two years, third-party and and effective COVID-19 vaccine within
supply chain risk have gone from a niche a contained and secure production
area of operational and compliance risk ecosystem that could then be quickly
management to a widely recognized transported and distributed to cities, towns
business mainstay and regulatory mandate and rural communities across the U.S.
for all organizations, gaining traction in
Cyber-attacks, such as SolarWinds and
everyday vernacular.
the Colonial Pipeline hack, elevated
The urgency of the pandemic and ensuing government and business consciousness
effort to maximize the security and scale around the increasing threat posed by the
of the global healthcare supply chain for modern risk landscape. At the same time,
personal protective equipment (PPE), the effects on gas prices resulting from the
ventilators and other emergency medical Colonial Pipeline attack, or the impact on all
supplies, brought with it a heightened major industries stemming from the global
sensitivity to the exposure of an already shortage of semiconductors, have alerted
burdened supply chain to adversarial even the everyday consumer to the role of
or security risks. This awareness was the supply chain in their day-to-day lives.
amplified by the race to develop a safe

2 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
A RAPIDLY EMERGING MANDATE FOR A NEW RISK
MANAGEMENT REGIME
In response to the rapidly shifting It has also led to agencies engaging
landscape and heightened awareness of industry to shore up fragile supply chains;
the supply chain and vendor ecosystem As Commerce Secretary Gina Raimondo
vulnerabilities, the White House, U.S. told Jim Cramer in an interview on
regulators and Congress have rallied CNBC’s “Mad Money,” “We are going to
around the need for a more advanced, get it done. There’s no option… When the
technology-driven and intuitive approach semiconductor supply chain is disrupted,
to securing critical supply chains across the economy is disrupted.”
major industries. Even within the
Raimondo emphasized the pervasive
government itself, and its vast network of
nature that a supply chain shortage can
affiliated contractors and vendors, there is
have on the global market, “They’re in your
an almost unprecedented call to manage
dishwasher, your car, your computer, your
supply chain and third-party cyber
headset, your phone, military equipment.
vulnerabilities, only rivaled by the security
So, yes, we’re going to get it done,”
reforms implemented after 9/11.
describing this disruption as both an
In February 2021, the White House issued economic and national security imperative.
a landmark executive order on America’s
With the American Rescue Plan and
Supply Chains, triggering a 100-day
Consolidated Appropriations Act as
supply chain review and broader one-year
a vehicle, members of Congress are
critical infrastructure sector reviews, and
pushing other industries, including food
calling on stakeholders across industries,
production and agriculture, to strengthen
academia, the nonprofit community,
the supply chain resilience against future
labor, and state and local government to
disruptions. The House Committee on
reinvent the country’s supply chains as
Transportation and Infrastructure has also
resilient, diverse and secure engines of
introduced legislation that incorporates
economic prosperity and national security.
supply chain resilience into the renewed
In tandem with the White House’s push for infrastructure development and
coordinated, national review of major investment, specifically as it relates to
supply chains, U.S. regulators are U.S. ports.
spearheading preliminary assessments of
their respective covered areas as part of a


larger push to future-proof the country’s
critical industries. The Department of There is an almost
Energy’s Bulk Power System Request for
Information, for example, solicited input
unprecedented call to
on threats and vulnerabilities as well manage supply chain
as recommendations from energy and and third-party cyber
security stakeholders.
vulnerabilities, only
Congress has also taken up the issue of rivaled by the security
securing the supply chain. For example, the
reforms implemented


global shortage of semiconductors has led to
calls for legislators to intervene as Congress after 9/11.
prepares new legislation on the issue.

3
this alliance will reform every industry
and would include most of the industrial
REAL-TIME RISK/ nations; this concept has been coined the
Democracy 10 or the Tech 10.
REWARD. Although inherent to U.S. national and
economic security, this trend is not isolated
to the U.S., our Allied partners and other
Harness disparate data at speed &
foreign governments are also helping to
scale with Exiger’s Award-Winning AI
define the new standard for corporate
solutions to visualize your full risk picture.
responsibility in their own way as it
relates to third-party and supply chain
risk management. The Supply Chain Due
Diligence Act was adopted by the German
The fragility of our supply chains, and Federal Parliament on 11 June 2021 and will
the associated impact to economic enter into force on 1 January 2023. It aims
security, is amplified by an increase in to improve the protection of international
geopolitical tensions between the U.S. and human rights and the environment
its near peer adversaries, the rise of the by setting binding standards for large
cyber mercenaries and increasing global companies and their value chains.
competition for cutting-edge technology.
In particular, the escalation of geopolitical As foreign and domestic governments,
tensions and the untenable reliance on regulators, legislators and business leaders
adversarial supply lines has morphed from consider the elements and steps required
an alarm sounded by the U.S. intelligence to secure critical supply chains against
community to a government-wide, and increasing threats, a consensus is forming
even global ally, cacophony of concerns around the need for a modern third-
around the multiple concomitant threat party and supply chain risk management
vectors posed by our adversaries. framework.
The attacks on America and its allies Exiger is at the forefront of this effort,
are sophisticated and multi-faceted, working closely with multiple government
engaging in what some would call hybrid entities and corporate entities to not only
warfare. “Hybrid Threats” are composed navigate supply chain and third-party
of cyber attacks, physical attacks, risk events that have underscored the
supply disruptions, economic pressure, need for immediate action, but to also
espionage, intimidation, and covert help consider and create a framework for
incursions by loosely affiliated extremists. continuous monitoring and mitigation of
The hybrid attack is now the modus risks within this area.
operandi of U.S. adversaries, criminals
and terrorists. Looking at one threat In an effort to encourage further dialogue,
vector in a vacuum, like cyber, has led to coordination and adoption of a robust,
persistent and intractable damage to our new risk management regime, Exiger has
critical infrastructure and essential civilian drawn on its deep and broad experience
industries. and advanced technology solutions to
develop a proactive and adaptable third-
To combat this risk, the U.S. and its allies party and supply chain risk management
have begun to organize different alliances framework as well as progressive model
to reduce adversarial supply into critical to track organization’s programmatic
areas of infrastructure and innovation, maturity over time.
like the 5G buildout. The key players in

4 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
SNOWBALLING REGULATIONS TRANSFORM SCRM
Federal Security Enhancements (2017 - 2022)

AUGUST 18, 2017 | link JULY 23, 2018 | link AUGUST 13, 2018 | link
FDA Reathorization Act of Foreign Investment Risk Review John S. McCain National Defense
2017 (FDRA) Modernization Act of 2018 (CFIUS/ Authorization Act (NDAA) for Fiscal Year 2019
FDA was required to review and FIRRMA) Section 889(a) (1) (B) prohibits U.S. government
update processes and standards House and Senate agree on consensus contracts with entities that use telecommunications
of domestic and foreign medical version FIRRMA, which would expand the equipment or services produced by Huawei
device establishments. authority of CFIUS to review certain foreign Technologies Company and ZTE Corporation, and
investments vulnerable to exploitation. others.

AUGUST 13, 2018 | link DECEMBER 21, 2018 | link MAY 15, 2019 | link
CFIUS/FIRRMA Secure Technology Act Executive Order: Securing the
The President signs into law the Foreign Investment By amending Title 41, Public Information Communications
Risk Review Modernization Act of 2018 (FIRRMA). Contracts, Congress bolstered Technology and Services Supply Chain
It strengthens and modernizes the Committee on the U.S. government’s acquisition Authorized import regulations to protect
Foreign Investment in the United States (CFIUS), oversight for critical information against foreign adversaries who use
a multi-agency government body chaired by the and communications technologies ICT “to commit malicious cyber enabled
Secretary of the Treasury that reviews foreign (ICT) and created the Federal actions, including economic and industrial
investment for national security considerations. Acquisition Security Council. espionage.”

DECEMBER 20, 2019 | link


National Defense Authorization Act (NDAA) Amendments
Section 224 - Requiring Defense Sec. 889 (A): Prohibits the government Entity List unless certified by the Secretary.
Microelectronics Products and Services from obtaining (through a contract or other Sec. 1260J, the NDAA instructs the President
Meet Trusted Standards: The NDAA instrument) prohibited telecoms, certain to submit to Congress an annual report on
instructs DOD to ensure by January 1, 2023 telecommunications equipment (including the compliance of ZTE with the Superseding
that microelectronics purchased by DOD video surveillance equipment) or services Settlement Agreement.
meet supply chain and operation security produced by the following covered entities
Sec. 1648, 1657, 6307 - Provisions
standards. and their subsidiaries and affiliates.
Aimed at Improving Cybersecurity in
Section 845 - Modernization of Acquisition Sec. 889 (B): Prohibits the government the Defense Space: Directs the DOD
Processes to Ensure Integrity of Industrial from contracting with any entity that uses to develop a framework to enhance
Base: Orders the DOD to streamline and certain telecommunications equipment or cybersecurity, the secretaries of the
digitize the existing approach for identifying services produced by the entities listed in military departments to each appoint an
and mitigating risks to the defense the statute: Huawei Technologies Company, independent Principal Cyber Advisor, and
industrial base by creating a continuous ZTE Corporation, Hangzhou Hikvision the Intelligence Community must consider
model that uses digital tools, technologies Digital Technology Company, Dahua their infrastructure, equipment and services
and approaches designed to ensure the Technology Company. The government also when entering into an intelligence-sharing
accessibility of data to key decision-makers. cannot contract with an entity that uses agreement with a foreign government or
covered telecommunications equipment entity.
Section 847 - Mitigating Risks Related
or services as a substantial or essential
to Foreign Ownership, Control, or Sec 1711 - Pilot Program on Strengthening
component of any system or as critical
Influence (FOCI) of DOD Contractors and Manufacturing in the Defense Industrial
technology as part of any system.
Subcontractors: Requires prospective DOD Base: Directs the creation of a pilot
contractors or subcontractors to disclose Sec. 1260(I) and (J) - Provisions Related to program to support small and medium-
beneficial ownership and whether they are Chinese Telecommunications Companies: sized manufacturing companies that
under foreign ownership. Sec. 1260I prohibits the Secretary of produce “emerging defense and
Commerce from removing Huawei from the commercial technologies.” 

JANUARY 7, 2020 | link FEBRUARY 13, 2020 | link MAY 1, 2020 | link
National Counterintelligence Strategy for the United Amendments to CFIUS/ Executive Order 13920:
States of America 2020-2022 FIRRMA Securing the United
States Bulk Power
Presents a new perspective on how to effectively address foreign U.S. Treasury Department
updated CFIUS’s authority to System
intelligence threats as a nation. There are 5 strategic objectives: (1)
protect the nation’s critical infrastructure, (2) reduce threats to key include filing requirements Authorized the federal
U.S. supply chains, (3) counter the exploitation of the U.S. economy, for certain investments in TID government to work with
(4) defend American democracy against foreign influence, and (5) businesses. the energy industry to
counter foreign intelligence cyber and technical operations. secure America’s BPS.

5
SNOWBALLING REGULATIONS TRANSFORM SCRM
Federal Security Enhancements (2017 - 2022)

AUGUST 6, 2020 | link SEPTEMBER 9, 2020 | link


Executive Order: Ensuring Essential Medicines, Medical Department of Defense Directive 5000.01:
Countermeasures, and Critical Inputs Are Made in the The Defense Acquisition System
United States Security, cybersecurity, and protection of critical technologies at
Calls for the Secretary of HHS to identify and mitigate vulnerabilities. all phases of acquisition are the foundation for uncompromised
It also authorized the U.S. to negotiate with countries to increase delivery and sustainment of warfighting capability.
site inspections of regulated facilities.

SEPTEMBER 30, 2020 | link OCTOBER 15, 2020 | link


Executive Order 13953: Addressing the Threat to the National Strategy for Critical & Emerging
Domestic Supply Chain From Reliance on Critical Minerals Technologies
from Foreign Adversaries
Defines Critical & Emerging Technologies (C&ET) as those
The EO implements the recommendations from Executive Branch technologies that have been identified and assessed by the
efforts pursuant to EO 13817 of Dec 20, 2017 “A Federal Strategy to National Security Council to be critical to the US national
Ensure Reliable Supplies of Critical Materials.” This includes minimizing security advantage. The US will continue to lead the world
undue reliance of critical minerals from foreign adversaries by in C&ET by implementing two necessary pillars of success:
assigning the Secretary of the Interior and the Secretary of State to promoting the National Security Innovation Base (NSIB),
submit reports, prioritizing and securing the domestic supply chain and protecting our Technology Advantage.
and strengthening local processing capabilities.

February 24, 2021 | link April 21, 2021 | link


Executive Order on America’s Supply Chains Uyghur Forced Labor Prevention Act
Establishes need for “resilient, diverse, and secure supply chains to ensure This bill imposes various restrictions related to China’s
our economic prosperity and national security.” Highlights specific risks Xinjiang Uyghur Autonomous Region, including by
including pandemics, cyberattacks, and reduced critical manufacturing prohibiting certain imports from Xinjiang and imposing
capacity. It also commissioned a series of studies and reports on supply sanctions on those responsible for human rights
chain risks related to semi-conductors, critical minerals, defense industrial violations there.
base, ICT, energy sector and more.

May 12, 2021 | link July 22, 2021 | link October 26, 2021 | link
Executive Order on Improving National Supply Chain Database Act China Telecom (Americas)
the Nation’s Cybersecurity of 2021 Corporation Order on
Establishes need for Federal This bill requires the National Institute of Revocation and Termination
Government to identify, deter, Standards and Technology to establish and The FCC adopts an order ending China
protect against, detect, and respond maintain a National Supply Chain Database Telecom (Americas) Corporation’s
to “persistent and increasingly to assist with minimizing disruptions to the ability to provide domestic interstate
sophisticated malicious cyber U.S. supply chain through an assessment of and international telecommunications
campaigns.” U.S. manufacturers’ capabilities.  services within the United States. 

December 12, 2021 | link March 01, 2022 | link


Ocean Shipping Reform Act of 2021 Strengthening American Cybersecurity Act of 2022
This bill, which passed House in December 2021, revises This bill, which passed Sentate in March, addresses cybersecurity
provisions related to ocean shipping policies and is designed threats against critical infrastructure and the federal government. The
to support the growth and development of U.S. exports and Cybersecurity and Infrastructure Security Agency (CISA) must perform
promote reciprocal trade in the common carriage of goods ongoing and continuous assessments of federal risk posture. The bill
by water in the foreign commerce of the United States. requires reporting and other actions to address cybersecurity incidents.

6 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
THE MODERN RISK LANDSCAPE
Today’s third-party and supply chain risk landscape represents the convergence of both
imposed and inherent factors that, when combined, amplify the challenges organizations
must manage to effectively protect their operations, proprietary information and private
data, and secure their vendor and supply ecosystem.

INHERENT RISK IMPOSED RISK

Reputational, Supply Chain


Financial Macroenvironmental
Criminal and Operational
Health Risk Threats
Regulatory Risk Challenges

Foreign Ownership,
Control and Influence Operational Risk
(“FOCI”)

INHERENT RISKS
The prevalence of external attacks on the supply chain and the traditional regulatory
regime perpetuate the belief that the vast majority of threats come from external factors,
largely outside the control of any one organization. A great deal of third-party and
supply chain risks, however, are inherent to the vendors in their ecosystem, which should
effectively incentivize organizations to take charge of these areas where they have greater
insight into threats and greater control over outcomes.
Inherent risk in a vendor can be divided into four categories: financial health; foreign
ownership, control and influence (FOCI); reputational, criminal and regulatory,
and operational risk. Each category combines to form an organization’s functional
environment. In a threat landscape where organizations across nearly every industry and
area of government are exposed to daily external attacks, management of their functional
environment and a proactive stance on inherent risk is one of the greatest defenses
against third-party and supply chain risk that can be deployed.

7
Four Areas of Inherent Risk and Exemplar Data Elements that Form an
Organization’s Functional Environment:

Financial Health Risk Foreign Ownership, Control and


A vendor’s financial management can Influence (“FOCI”) Risk
either build or erode at its ability to deliver Organizations often have low visibility
as contracted—or to weather its own into the presence of foreign ownership,
supply chain disruption or volatility. How control, and influence in their supply chain
an organization manages solvency, liquidity, and vendor ecosystem, and they therefore
operational efficiency and cyclical risk are struggle to manage it. The existence and
central to its ability to regulate overall financial impact of FOCI risk is often difficult to
health and are critical to performance. quantify due to opaque or intentionally
Unstable payment performance, debt obfuscated ventures, or the failure to track
ratios, single contract dependence, a lack recent or latent M&A activity that can be
of funding sources, layoffs, facility closures, executed through special purpose vehicles
analyst downgrades and certain profitability or complex funding arrangements. Also, the
measures are red flags for increased foreign influence aspect of FOCI risk can
financial risk. By collecting and analyzing be exerted through partnerships with state-
indicators from financial data, such as owned entities, businesses ties to indirect
commercial credit scores, self-reported state-ownership, foreign adversarial reliance,
revenue, stock and financial reporting, or foreign operational dependence, leading
bankruptcies and filings, organizations can to a more amorphous category of risk.
create a financial stability composite that Organizations can monitor this risk;
offers clearer insight into financial health. however, by tracking key inputs, such
as locations tied to business partners,

8 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
corporate records, ownership records, export violations, False Claims Act violations
transaction news, foreign revenue or other antitrust concerns, contract fraud
exposure as well as relevant information or the presence of conflict minerals in the
on dominating markets, customers and supply chain is essential to effective supply
suppliers for their immediate vendor chain and third-party risk management.
population. Organizations can also mitigate
FOCI risk in their vendor ecosystem by
diversifying their supply based upon key Operational Risk
metrics including the percentage of foreign
Organizations may be unknowingly
investment, the hiring of foreign key
exposing themselves to greater third-party
personnel, the percentage of foreign R&D
and supply chain risk by shortsightedly
or manufacturing locations, or the use of
focusing on compliance or jurisdictional
foreign data centers.
risk. The various aspects of operational
The use of FOCI data to determine risk – ranging from the resilience of a
jurisdictional dependency in commercial vendor’s manufacturing infrastructure,
supply chains is invaluable. Understanding to their cybersecurity hygiene to the
where funding sources, manufacturing management of human capital – should
capabilities or logistics operators are be addressed by a modern third-party and
subject to disruption based upon regional supply chain risk management framework.
disasters, climate changes, geopolitical
The cyber landscape is increasingly
tensions or adversarial interests is critical
the preferred setting for supply chain
to supply chain risk management and the
strikes as recent headline-grabbing
FOCI location identification provides an
attacks have demonstrated. In today’s
organization with a complete picture of a
sophisticated cyber threat landscape, it’s
vendor’s jurisdictional footprint.
imperative that organizations develop and
maintain a technology and cybersecurity
infrastructure that guards against attacks
Reputational, Criminal and targeting their third-party managed
Regulatory Risk systems and infrastructure.
Compliance, including oversight and An effective cybersecurity program will
monitoring of reputational, criminal and include a broad range of security controls
regulatory risk, serves as the frontline that span across people, process, and
for fortifying a vendor ecosystem and technology considerations. Many security
interceding where said risk can infect controls can be measured in an automated
an organization’s operational delivery or and repeatable way. Some security
brand reputation. Proactive identification controls are not easily measured but can
and proper handling of misconduct and be surfaced by other data collection and
ethics violations in a vendor ecosystem analysis methodologies. Key factors when
can help secure the organization against measuring cybersecurity posture include
reverberating reputational impacts, such validation that proper cybersecurity
as those seen in the Xinjiang human controls are in place, confirming proper
rights abuses and alleged Pegatron labor configuration of existing controls,
violations. Furthermore, careful attention addressing vulnerabilities in cybersecurity
to and continuous monitoring of adverse controls and continuous assessment of
media, criminal records, suspensions, additional indicators of cybersecurity
debarments, defective pricing, regulatory risk. IT disruptions, connectivity issues,
enforcement actions, sanctions lists, import/ incidents involving the loss of critical

9
ESG: Expanding the
Aperture of Risk Environmental
FOCI Controversies
Foreign Ownership,
Control & Influence
As regulation and FH Risk
commitments around Financial Diversity and
Inclusion
ESG performance
ESG
Health Risk
grow, ESG risk is
Safe Labor
a critical part of Environmental, Practices
third party and Social &
Governance Risk
supply chain risk OR Modern
Slavery
management Operational
Risk RCR
Reputational,
Criminal &
Sound
Regulatory Risk
Governance

information or personally identifiable Poor management and retention of


information, reliance on unsecure human capital may increase risk exposure.
networks or systems, IT implementation Organizations should track external
failures and operations security and factors such as industrial unrest, labor
information security violations are all disputes and limited access to a capable
indications of a weak technology and workforce in certain delivery jurisdictions,
cybersecurity infrastructure. as well as regulate factors internal to the
vendor, such mass layoffs, work stoppage,
A cybersecurity posture assessment can
human rights violations, human trafficking
measure cyber defenses holistically across
and worker’s health and safety to limit
a broad range of technical and operational
their own third-party and supply chain
considerations. A formalized approach to
risk. These indicators should be used to
the cybersecurity posture assessment can
identify entities within an organization’s
help organizations measure incremental
vendor ecosystem and supply chain that
improvements over time to their vendor
may be involved with human rights abuses
cybersecurity program. Automated
and adverse labor practices.
cybersecurity posture assessment
is beneficial to ensure proper cyber Organizations can better regulate their own
protections are in place to protect both internal human capital through enhanced
corporate and partner ecosystems. personnel vetting and security measures.
In the case of software development,

10 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
for instance, every individual involved Combining realistic, cost-efficient, and
in the development process should be effective training with a thorough,
considered a potential threat vector. Many predictive insider-threat program based on
cybersecurity training and awareness behavioral indicators of personnel risk can
programs are check-box, or bare minimum identify potential software integrity issues
exercises (as opposed to threat-based), before they become true vulnerabilities.
and therefore not effective over time.

IMPOSED RISKS
Outside of risk factors germane to a vendor’s internal operations and the inherent risk
environment, a vendor ecosystem must navigate the larger external threat landscape, which
today is laden with imposed, macro, risk. An informed, transparent and proactive posture
will help organizations identify and mitigate the risk imposed on their vendor ecosystem
and limit the regulatory, legal, reputational and business operations consequences
associated with recent breakdowns in third-party and supply chain environments.

Macroenvironmental Threats Economic Movements


The larger macroenvironment within Sudden and dramatic movements in
which major multinational corporations the global economy may also expose
and government entities operate in supply chains and vendor environments
today presents a variety of external risk to unanticipated risk. Unexpected
factors that are largely unpredictable and fluctuations, such as demand shocks,
uncontrollable, including environmental economic instability and inflationary
disruptions, geopolitical threats and changes, as well as mounting political
economic movements. A modern third- tensions culminating in changes to
party and supply chain risk management trade policy, economic sanctions, trade
framework must therefore anticipate these wars and trade restrictions, may lead
risk factors through regular tracking and to operational disruptions and changes
pre-planned mitigation tactics. in suppliers and distribution routes, all
exposing organizations to greater risk.
Geopolitical Threats
Environmental Disruption
Many organizations, particularly
multinational corporations, financial Although often overlooked in today’s
institutions and government entities, corporate risk management infrastructure,
are well acquainted with the persistent, environmental disruptions pose an
yet unpredictable, risk presented by increasingly serious threat to operational
geopolitical and regulatory shifts. continuity, security and financial health.
This includes obvious threats and Hurricane season annually in the Gulf
blatant attacks in the form of industrial Coast and Easter Seaboard of the
espionage and acts of terrorism as well US tends to be more active, drawing
as peripheral dynamics that increase risk, concern that already strained supply lines
such as fluctuations in regional politics, might break if subject to devastating
changes in local government, interstate storms. Extreme weather events, natural
conflicts, border delays and territorial disasters, man-made risks, such as
disputes along trade routes. electrical fires or nuclear events, and

11
pandemics can all affect an organization’s Product Quality and Design
supply chain and vendor ecosystem
Poor product quality and assembly
as much as traditional threats like
as well as the presence of R&D cost
cyberattacks or foreign influence.
overruns and counterfeit or non-
Macro-risk data, and even synthetic MILSPEC parts are not only indicators of
disruption data, can be used to creative greater supply chain risk but may also
a predictive or probabilistic view of result in system or parts performance
risk. This can be done on a wide array failure. Counterfeit and other product
of risk types, including, but not limited risks can be illuminated using
to, geopolitical risks or natural disasters. sophisticated counterfeit risk analysis
Additional concentrations of natural algorithms that measure the likelihood of
disasters, such as earthquakes, tsunamis, a part being targeted by counterfeiters
and eruptions, can also be tracked and through considering, among other
plotted across the known operational factors, previous instances of counterfeit
footprint of a supplier group to indicate activity from a manufacturer, product
impact and severity of the disruption and technology type, historical supply
against specific suppliers in the affected chain shortages, product longevity
regions as illustrated in the example below. in the market, product recalls and
price discrepancies. For instance, in
the COVID-19 response effort, one of
the most reliable indicators of future
product performance and quality was
the performance of past products;
namely, the existence of product recalls
for companies that were provided
emergency use authorization for
COVID testing or treatment products.
Organizations should implement product
stability metrics that incorporate
product availability tenure, product
sales and use analytics, product efficacy
statistics, product recall indicators,
Natural Disaster Severity Based on Historical
Predicted Path of Typhoons in the South China Sea
product maintenance and support
guarantees, product versioning and
performance, compatibility rigidity,
product life metrics and more.
Supply Chain Operational Challenges


Clear insight into supply chain operations
is fundamental to an organization’s risk
management. Careful attention across Clear insight into
the supply chain must be paid to areas
of unexpected but present risk, including
supply chain operations
product quality and design, manufacturing is fundamental to an
and supply, and transport and distribution. organization’s risk
management.


12 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
shortages in parts and spares. Process
INTRODUCING and operational structures such as sole
source dependency and outsourcing
may also be indicative of greater supply
chain risk exposure.

Exiger launches first ever single-click Transport and Distribution


supply chain risk detection platform
Organizations are incredibly reliant on
REQUEST FREE EARLY ACCESS TRIAL a stable transportation and distribution
network and are therefore wide open
to attacks or disruptions within that
Product oversight, when applicable, network. A secure transportation
should also extend to the presence of network, shipment accuracy and
conflict minerals within the supply chain, delivery performance must be ensured
which can result in ethics violations, by an organization’s supply chain risk
import / export violations, government management framework.
contract fraud and regulatory The collection and analysis of data
enforcement actions. Exposure to on partners, affiliated personnel and
conflict minerals can also indicate other supply chain indicators can drive
substandard materials in a supply chain. greater understanding and mitigation
The presence of conflict minerals (gold, of supply chain risk. This includes the
tantalum, tin, and tungsten) should identification of addresses and locations
be illuminated using a combination of where business is conducted, corporate
open sources, government records and family information (immediate parent,
structured data sets. ultimate parent, subsidiaries, etc.),
affiliated company relationships
Manufacturing and Supply (suppliers, primes, prior business
General manufacturing and the supply dealings and subcontractors), affilated
that feeds that process may be exposed individual relationships (management
to undue risk in the form of material team, board of directors and
shortages, production delays, extended shareholders) and risk-informed market
lead times, inventory issues, capacity and business intelligence.
incidents, equipment downtime and

13
TRADES: THE ESSENTIAL ELEMENTS OF A MODERN
ENTERPRISE THIRD-PARTY AND SUPPLY CHAIN RISK
MANAGEMENT FRAMEWORK
Today’s dynamic threat landscape, To guide this exercise, Exiger has
including inherent and imposed risk, developed TRADES—a propriety
is a quickly exploding mandate that framework that allows organizations
demands an actionable risk management to achieve supply chain resilience and
framework. Organizations must embrace a optimize risk management at any phase
much more considerate approach to third- of maturity. There are six critical pillars to
party and supply chain risk that provides constructing the TRADES framework, each
consistent measures and workable tools, representing a different implementation
engages all responsible stakeholder lens at the tactical, program and strategic
groups and provides a roadmap for levels. This framework simplifies the third-
tactical, programmatic and strategic party and supply chain risk management
implementation. process and reflects the complexity and
evolving nature of today’s threat landscape.

How

What
Where

14 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
TRADES: TRANSPARENCY OF CURRENT STATE
The TRADES Framework begins with transparency. Today, many supply
chain vulnerabilities arise through a lack of transparency within the
third, fourth, or nth party in an organization’s network. To mitigate this
risk, organizations must establish a clear baseline and starting point
from which they gain a complete picture of their supply chain and
vendor ecosystem and can build a risk management framework from the
ground up.

Tactical Level Transparency within the vendor ecosystem


requires a coordinated outreach and
At a tactical level, organizations must
dialogue with third-party vendors and the
establish internal, third-party and
collection and organization of all related
supply chain transparency. Within the
information. Compiling completed vendor
organization’s own operations this means
questionnaires, Requests for Proposals
clear, accountable insights into spending,
received, and contractual documentation
product demand and dependencies,
will provide an interim basis on which
business unit provider engagement,
an organization can build out, via
availability, resources, product supply and
independent and direct data sourcing, a
inventory. This should also include the
clear map of their supply dependencies.
establishment of relevant risk stewards
for every risk type, including information Lastly, utilizing an accurate third-party
security, legal and privacy, financial health roster, organizations can iteratively
and reputational risk. identify supplier tiers by leveraging a
combination of internal and external
supply chain data.

Leveraging Internal Supply Data Elements Incorporating External Supply Chain Data
Often, organizations maintain a set of materials Elements
that can provide insight into a supply chain if After the primary, secondary and, potentially,
properly mined. For instance, in many cases tertiary tiers of a supply chain are exhausted
hardware is provided with minimum operating using internal data, the three data types that
specifications or product manuals that reveal provide a comprehensive site picture across a
minimum requirements or warrantees that can supply base are: 1) Federal/Public Contracting,
provide a window into the software, chip sets, Purchasing, and Spend Data; 2) Open Source &
materials suppliers, testing partners and OEMs its Product Data; and 3) Commerce, Shipping, and
underlying provider is definitively leveraging. The Logistics Data. These three source areas can be
data in this segment of internal supply chain data used together to recursively create a complete
can include, but is not limited to: supply map for any vendor in your population,
1. Product SKUs, BOMs, and OEM supplier sourcing including software supply relationships.
lists; Starting with an initial tier of vendors, your third
2. Risk disposition or mitigation data; parties, entities can execute five steps at each
3. Product manuals and maintenance requirements; successive tier to identify the critical supply
4. Minimum product operating systems; chains that have a high probability of affecting
5. Logistics, shipping, and facility tracking information;
their supply or operational performance.
6. Vendor questionnaires and rating methodology; and
7. Vendor screening results.

15
By continuously leveraging the
Comprehensive
Vendor Roster at three source areas organizations
Current Tier can illuminate the supply paths
Inherent or Imposed Vendor Product
Risk Analysis Criticality Map
that are critical and identify pinch
points, supplier dependence,
supply overlap and critical
Vendor Product Vendor Product risk indicators that can affect
Sourcing & Supply Prioritization by Risk an organization’s regulatory
Buildout or Criticality obligations or reputation.

Program Level stakeholders and governance forums, as


well as the communication and workflows
Creating and maintaining transparency
necessary for program operation.
at a program level starts with a baseline
analysis of the program’s maturity – or
lack thereof. From there, companies Strategic Level
should develop and maintain policies and
procedures with actionable guidance on At the highest, strategic level, a living
how to measure and track indicators of document should set forth a mission
transparency over time. Organizations statement and purpose explanation for
should identify appropriate risk area the organization’s third-party and supply
chain risk management program.

TRADES: RISK METHODOLOGY DESIGN


With a clearer picture of the organization’s vendors ecosystem and
supply chain and the risks each present, organizations can then go about
designing and implementing an appropriate risk methodology.

Tactical Level complexity and jurisdictional ownership.


The strength of the compliance regime and
The risk methodology must address
financial health must also be assessed by
macro and micro risk as well as products
the risk methodology design. Reputation,
or services risk. At a macro supply chain
compliance and regulatory risk indicators
level, organizations should be monitoring
include financial crime compliance, human
for imposed risk indicators such as
rights violations, and environmental, social
disruption, scarcity, security and the
governance. Indicators of financial health
availability of alternatives.
include credit stability, delinquencies,
The third-party and supply chain risk employee count and revenue.
management framework must also address
Finally, the risk methodology design should
micro or inherent risks. This includes
account for product and service risk with
operational risks, such as cybersecurity and
a higher criticality rating given to those
industry safety and facility certification,
products and supplies that are “must-haves.”
as well as FOCI risks, such as corporate

16 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
Program Level `Strategic Level
The risk methodology should track and An agreed upon definition of risk and
monitor all the sub risks aligned to the an expressed business, third-party
organization’s industry and third-party and resource threat and opportunity
types. The program should determine landscape should inform an organization’s
underlying risk indicators to measures long-term third-party and supply chain
third-party risk and include evaluation of risk management framework.
critical third parties.

TRADES: ASSESS CURRENT RISKS


With an accurate representation of the program’s maturity and a
thoughtfully designed risk methodology, organizations can proceed to
assess their current risk landscape.

Tactical Level Program Level


At a tactical level, the risk assessment Implementing a risk assessment
process should include application, program begins with defining the risk
visualization and a vulnerability evaluation. assessment application and prioritization
Individual third-party risk assessments, process. From there, organizations
critical supplier assessments as well as need to determine the frequency of
supply chain assessments should all be risk assessments and establish policies
included as part of an organization’s risk to escalate risk events. Risk thresholds
assessment application. That risk should and decision-making processes must be
then be visualized to depict third-party clearly documented.
and supply chain portfolio risk areas
and indicators to provide actionable
intelligence and allow for the prioritization Strategic Level
of investigation and mitigation efforts To maintain a robust, long-term third-
in an efficient manner. A high-level party and supply chain risk management
comprehensive assessment should evaluate framework, organizations must agree to and
overall vulnerabilities across the complete document a broad risk appetite statement.
third-party and supply chain ecosystem.

17
TRADES: DETERMINE MITIGATIONS
It’s not enough to merely identify and monitor risks. Organizations
must also have a plan to quickly address and resolve risks in real time
as they’re uncovered in the supply chain and vendor ecosystem.

Tactical Level must address program improvement


areas appropriate to the program’s goals
Organizations must outline third-party
and evaluate their programs based on
level mitigation and risk acceptance
the organization’s risk appetite. A clearly
decisions. This may include identifying
defined risk acceptance process will help
alternative vendors, engaging with
organizations operationalize this step.
suppliers directly to avoid disruption and
maintaining reviews of risk acceptance
and appropriate tolerance.
Strategic Level
Organizations should strive to construct
Program Level the third-party and supply chain risk
management program that optimizes
In order to install mitigating measures
supply chain security and mitigates
into the third-party and supply chain risk
loss without compromising operational
management framework, organizations
efficiency. This will look different for every
should provide clear guidance on
organization but should achieve the shared
escalation paths of unmitigated risks.
goals of minimizing undue risk and avoiding
They should also create governance
costly attacks, operational disruptions and
to document risks, mitigation paths,
regulatory or legal violations.
and track milestones and timelines
throughout remediation. Organizations

18 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
TRADES: EVALUATE FRAMEWORK UPLIFT
Once tolerable risk acceptance and appropriate mitigation measures
have been defined, organizations need to quantify the uplift necessary
for implementation.

Tactical Level Program Level


Organizations can effectively evaluate After mitigation options are raised,
framework uplift by deploying third-party organizations need to identify the
questionnaires enhancements, increasing necessary third-party and supply
third-party engagement and reassessing chain risk management program uplift
new entity level risks and associated risk requirements, such as governance, data,
indicators when mitigations have been put resources, risks and training.
in place. This is also an area where the
traditional third line of defense, audit and
assurance, can play a key role in assessing Strategic Level
the efficacy and appropriateness of
In order to ensure continued adherence
mitigation efforts.
and compliance with mitigation and risk
acceptance decisions, organizations
should consider an independent review
with a best-in-class provider or an internal
audit team.

TRADES: SUPPLIER MONITORING


Oversight and monitoring of suppliers within the vendor ecosystem
is the final pillar of a modern third-party and supply chain risk
management framework, and one that upholds long-term adherence to
the other elements of the framework and ensures the evolution of the
program overtime as the threat landscape similarly evolves and changes.

Tactical Level Program Level


Third-party and supply chain risk indicators Implementing a supplier monitoring
should be continuously monitored, allowing program includes carving out standards,
organizations to stay on top of risk and documenting third-party and supply chain
proactively identify changes that may be monitoring, as well as refreshing policies
required in risk evaluation. and procedures.

Strategic Level
Organizations should ensure their view of
the threat and opportunity landscape is
monitored and dynamically addressed.

19
IMPLEMENTING TRADES WITH SUPPORTING
OPERATIONAL METHODOLOGY
Every element of the framework should work in sync with one another and be
updated and reevaluated on a regular basis. A strong third-party and supply chain risk
management framework depends on a supportive operational methodology that allows
for continuous, real-time amendments that align with evolving business strategy and
changes in the risk landscape.
The update methodology has six key touchpoints: framework evaluation; stakeholder
engagement; governance principles; compliance management; data / IT; and execution.

FRAMEWORK STAKEHOLDER
EVALUATION ENGAGEMENT
Building off the initial third-party and Stakeholder engagement should be
supply chain risk management framework, triggered by framework evaluation.
an organization’s TRADES should be Appropriate stakeholder engagement
continuously evaluated and assessed for is essential to third-party and supply
effectiveness and updated when necessary chain risk management for proper
based on changes in the regulatory regime, implementation, oversight and compliance.
geopolitical landscape, supplier network Organizations should identify stakeholders
and other evolving threats. as part of a Responsible, Accountable,
Consulted, Informed (RACI) matrix;
relevant stakeholders will likely include key
executives and business leaders from legal,
compliance, procurement, onboarding,
operations, technology and security.

20 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
GOVERNANCE
PRINCIPLES EXECUTION
Governance principles should serve as The execution team responsible for
the blueprint for TRADES implementation implementing the TRADES Framework
and updates. Governance principles help plays a central role in implementing
organizations stakeholders assess risk, the framework across the organization.
and understand risk related decisions and Including, but not limited to, the
appropriate actions. These principles may maintenance of the supplier mapping
need to be revisited on a periodic basis as and risk identification systems, training
part of the third-party and supply chain of the stakeholder groups on the critical
risk management process. evaluation criterion for vendor risk,
conducting check and challenge sessions
with business lines and ensuring effective
COMPLIANCE adherence to agreed mitigation or risk
MANAGEMENT acceptance decisions.

Overall third-party and supply chain


compliance ensures the TRADES REFRESH
Framework is being applied consistently
and effectively across the enterprise.
AND REPEAT
The integration of ongoing compliance The update methodology should serve
functions and the oversight of the as underlying operational model for
TRADES Framework keeps third-party maintaining and refreshing the TRADES
and supply chain risk management aligned Framework. The process will repeat or pick
with industry and operational standards. up where it left off as part of an iterative
cycle of proactive, engaged decision
making that anticipates risk and mitigation
DATA needs before violations and vulnerabilities
AND IT materialize.

Data sourcing and right sized technology


must be aligned to the TRADES
framework to ensure a single source of
truth for each third-party, the supply chain
and the overall risk management program.

WHERE ALL DUE


DILIGENCE BEGINS.
automated due diligence platform
illuminates affiliated entities & people, enabling
comprehensive & continuous analysis fast and
for a fraction of the cost.

21
THE SCRM MATURITY MODEL: IMPLEMENTING
TRADES FRAMEWORK AT ANY MATURITY LEVEL TO
REACH A REASONABLE LEVEL OF CAPABILITY
TRADES is a framework for organizations hoping to achieve a long-term proactive or
predictive posture and stay ahead of threats and vulnerabilities while minimizing third-
party and supply chain risk management gaps. As companies embrace and implement
TRADES, they should progress along the third-party and supply chain risk management
Maturity Model, beginning with a reactive posture – where many companies find
themselves today – and progressing towards an anticipatory / predictive posture – the
end goal and gold standard of modern third-party and supply chain risk management.
The objective of the Maturity Model is to achieve a consistent, documented and proactive
governance framework supported by validated and continuously refreshed data. This
five-stage model establishes procedures and policies at tactical and strategic levels that
are enabled by decision-ready data.

T R A D E S
ƒ Predictive models and a dynamic TRADES framework
ƒ Criticality monitoring of critical sources of supply
Stage 4: Managed
Anticipatory/ ƒ High risk disruption events modeled for each critical region (e.g., Predicted
climate/weather events, pandemic/public health event, political unrest
Predictive Monitored
events, etc.) and impact assessed
Posture
ƒ Alternative sources of supply identified to minimize disruption and
migration plans developed
ƒ Risk appetite known, established RACI governance and continuous
program improvement model
Stage 3:
ƒ Sub-tier supplier ecosystem risk effectively mitigated, integrity
Proactive
restored, continuous monitoring activated to ensure resiliency
Posture
ƒ Micro-level entity risk across the entire supplier ecosystem is identified
through continuous monitoring and mitigated in real-time
ƒ Established strategy and governance
ƒ Tier 1 supplied ecosystem risk effectively mitigated, integrity restored, Tailored
Stage 2:
continuous monitoring activated to ensure resiliency Plan
Progressive
ƒ Sub-tier supplier ecosystem illuminated, and associated risk known and
Posture
mitigation plans developed for high-risk entities within sub-tier supplier
ecosystem
ƒ Risk owners and risk types known
ƒ Tier 1 supplier ecosystem illuminated and associated risk known
Stage 1:
ƒ Criticality assessment conducted, critical sources of supply identified
Awakened
and geographically mapped
Posture
ƒ Mitigation plans developed for high-risk entities within Tier 1 supplier
ecosystem
Find your
ƒ Fragmented program, with lack of strategy, governance, risk owners start point
Stage 0: and risk types
Reactive ƒ Largely unaware of supplier ecosystem or associated risk
Posture ƒ Risk identification is ad hoc/episodic and typically in response to
significant disruption that has occured

From Awareness to Action: The 5-Stage Maturity Model Maturity Level

22 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
STAGE 0: REACTIVE POSTURE STAGE 2: PROGRESSIVE
Maturity Level: T R A D E S POSTURE
Many organizations begin their third- Maturity Level: T R A D E S
party and supply chain risk management Following an awakened posture,
journey in a reactive posture. They may organizations should evolve to Stage 2,
have a fragmented risk management a progressive posture, with established
program that lacks strategy, governance, strategy and governance internal to the
risk owners and clearly defined risk types. organization and external for the vendor
These organizations may be largely ecosystem. Stage 2 organizations will have
unaware of their supplier ecosystem, and their tier 1 supplier ecosystem effectively
visibility of multi-tier upstream supply risks mitigated. Supply chain integrity has been
across the entirety of the risk taxonomy preliminarily enhanced and continuous
is typically poor. Operational, Financial monitoring is in place and active to ensure
Health, FOCI, and reputational, criminal resiliency. Also, the sub-tier supplier
and regulatory risk identification may be ecosystem will be illuminated, and
ad hoc or episodic and typically arises in associated risk identified.
response to significant disruptions. In Stage
0 organizations, risk is stove-piped, lacking
enterprise awareness and mitigation.
STAGE 3: PROACTIVE POSTURE
Maturity Level: T R A D E S
STAGE 1: AWAKENED POSTURE A truly mature third-party and supply
Maturity Level: T R A D E S chain risk management framework will be
proactive in identifying and mitigating risk.
Larger organizations with a global footprint Stage 3 organizations will have a known
may have already had firsthand experience risk appetite. They will have established a
with threats and attacks or the regulatory RACI governance structure and a model
mandate to take a slightly more engaged for continuous program improvement.
posture towards their third-party and The risk identified in the sub-tier supplier
supply chain risk management. These ecosystem risk will be effectively mitigated
organizations likely fall within Stage 1, an or accepted. Supply chain integrity will be
awakened posture. Stage 1 organizations restored and continuous monitoring is in
have defined risk owners and known risk place and active to ensure resiliency. Across
types. Their tier 1 supplier or third-party the entire supplier ecosystem, micro-level
ecosystem may be illuminated, and aspects entity risk is identified through continuous
of associated risk may be quantified. monitoring and mitigated in near real-time,
Criticality assessments have been ensuring these organizations are prepared
conducted and critical sources of supply for risk at the earliest stages and in its most
have been identified and geographically nascent forms.
mapped. These organizations have
developed mitigation plans for high-
risk entities within their tier 1 supplier
ecosystem. And across the enterprise, there
is relative awareness of supply chain risk
management and efficiency as operations,
compliance, risk and security divisions align
to the same risk picture.

23
STAGE 4: ANTICIPATORY / have predictive models in place and will
PREDICTIVE POSTURE deploy criticality monitoring of critical
sources of supply. High risk disruption
Maturity Level: T R A D E S events are modeled for each critical
The final stage and ideal end state for a region – from climate to public health
modern third-party and supply chain risk and political unrest – and their impact
management framework in the Maturity assessed. Alternative sources of supply are
Model is an anticipatory or predictive already identified to minimize disruption
posture. Organizations at this stage will and migration plans are developed and
ready for deployment.

A FRAMEWORK FOR THE FUTURE


In today’s challenging and rapidly evolving As government and organizations embark
threat landscape, organizations are on a coordinated effort to rethink and
quickly realizing that their operational rebuild supply chains and secure vendor
risks don’t stop at their doorstep. Just as ecosystems for resiliency, security and
organizations have developed policies economic prosperity, coordination,
and processes around their people, their standardization and iteration will be crucial
technology, their finances and their to applying lessons learned and reacting in
operations, vendors and supply chains have real time to emerging and evolving risks.
become integral to their ability to deliver
Exiger’s TRADES Framework and Maturity
uncompromised products and services.
Model offers organizations across any
This realization, coupled with heightened
industry and at any scale or level of
government scrutiny, is ushering a new
sophistication a clear and actionable
wave of compliance and an urgent push
blueprint to build a modern third-party and
to incorporate robust risk management
supply chain risk management program.
practices throughout organizations’ supply
chains and vendor ecosystems.

“ We were able to change the game on supply chain using commercially


available tools, and one of them for the trusted capital program is called
Exiger DDIQ. We run the companies through, and we can look at their
financials for anything on the company, from who is working on the board,
to where their financing has come from, legal issues etc.
Pentagon Briefing 2020

Under Secretary of Defense for Acquisition and Sustainment &
Chief Information Security Officer for DoD Acquisition and Sustainment

> Hear from the team who ‘changed the game in supply chain’

24 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
ABOUT EXIGER Exiger has demonstrated performance as the solution
of choice for critical Department of Defense (DOD)
Exiger is a global risk, compliance and technology-enabled Acquisition mission partners across the DOD Enterprise
AI and data analytics company that delivers innovative and has been battle-tested in the Joint Acquisition Task
solutions dating back to our founding in 2013. Blending Force (JATF) created to respond to the COVID-19 crisis.
cutting-edge technology with Exiger professionals’ Exiger’s DDIQ AI-based automated vetting and continuous
deep subject matter expertise, Exiger arms government monitoring platform is the SCRM standard as agencies
agencies, financial institutions and multinational work to comply with Executive Orders and Congressional
corporations with the practical expertise and technology expectations. Working in partnership with the Federal
solutions necessary to inform supply chain contracting Government across enterprise contracts provides Exiger
and security decisions, prevent breaches in compliance, unequaled insight into current and evolving strategic
proactively identify and mitigate risk, systematize risk SCRM standards, which we integrate into the DDIQ
mitigation processes, and monitor ongoing mission software solution for direct benefit to commercial clients.
activities with active alerts.

In a time when every headline is about a new threat to


our global economy, industry and government need to
understand their supply chain exposure at the speed of
relevancy. Exiger is helping companies find and navigate
those risks in a digestible and immediately actionable way.
Designed to drive transformational change in how entities
are vetted at an unprecedented scale, Exiger’s DDIQ has ABOUT SUPPLY CHAIN
conducted due diligence on tens of millions of entities
across the world’s largest financial institutions, corporates, EXPLORER
and government agencies; including over 90 companies Supply Chain Explorer is Exiger’s proprietary real-time
in the Fortune 250. In 2020, Exiger achieved triple-digit supply chain risk detection SaaS platform that empowers
percentage technology revenue growth, scaling to 700 companies and government agencies to rapidly surface,
employees worldwide and 10 offices around the world. understand and mitigate critical threats to their immediate
and extended supplier networks.

Purpose-built in response to market and client


demand, Supply Chain Explorer was developed in close
collaboration with some of the largest corporations and
critical government agencies. It allows users to visualize,
prioritize and escalate high risk relationships. A modular
three-in-one solution, Supply Chain Explorer discovers
ABOUT DDIQ supplier networks across digital footprints, global shipping
data and contract awards data in a centralized application,
All of our illumination and vetting starts with our flagship
delivering unparalleled transparency into supplier risk for
product DDIQ. DDIQ is an award-winning, industry-first
government agencies and critical infrastructure sectors,
AI powered research solution that combines emerging
including the Defense Industrial Base.
technologies to operationalize the analysis of near real-
time data to in support of risk management processes and Supply Chain Explorer draws on an aggregated blend of
decisions. Exiger’s DDIQ is purpose-built to automatically internal and external open data sets, including over 31
identify risks associated with foreign ownership, control, million direct unstructured and structured data sources,
and influence (FOCI); finance and operational health, 1.3 billion contract records, 7 billion source records of
fraud, waste, and abuse; and potential criminal, regulatory, supply chain installations, and 16.8 million unique supply
and reputational risk in its acquisition programs, supply chains. This solution also provides a comprehensive view
chains, and critical technology and infrastructure sectors. into supply chain risk across 50 different categories and
DDIQ AI reads, understands, and analyzes content with subcategories, including sanctions, trade embargoes,
the same approach and cognitive reasoning as skilled enforcement, state owned flags, cyber, modern slavery,
multifunction human analyst teams, but with greater and adverse media. The platform will ultimately include
scale and in a fraction of the time. DDIQ’s AI scale and other macro risks, such as disruption for raw materials,
speed allows clients to focus their time and expertise on natural disasters and more.
targeted, critical and imminent issues. Exiger’s platform
also provides your team direct virtual access to our Data from Supply Chain Explorer is available in a
multi-functional analyst team. Exiger’s customized User streamlined, user-friendly interface, removing the noise
Interface, Dashboards, and Risk Models, all supported and complexities that come with traditional manual
by the Exiger team, ensure analysts, product managers, due diligence and risk identification methods. The most
and executives have a comprehensive SCRM solution sophisticated technology of its kind, Supply Chain Explorer
to conduct consistent due diligence that accelerates leverages cutting-edge artificial intelligence and natural
the analytic process of turning open source data into language processing backed by a hyper scaling database
actionable intelligence. infrastructure.

25
The Exiger Advantage: Tangible & Proven Results

Established in 2013 by Award-Winning AI Powered by Exiger’s


investigations leaders to fight Threat Finance, Risk and CI Experts
financial crime, fraud, and We are leading and disrupting the market with
terrorism financing. We began our People + Tech solutions to identify, validate
by leading the court-appointed and analyze global risk indicators. Our AI
global Monitorship of HSBC; technology drives transformational changes in
the largest corporate how entities are vetted at unprecedented scale.
monitorship in history.

Exiger by the Numbers


95% 850+
false positive & clients worldwide
noise reduction

1,000s 93%
data sources already fuzzy matching,
10 offices
ingested, including premium deduplication &
across the globe. data sources, open web, deep entity resolution
Partnerships with an web, & watchlists.
extensive network of
on-the-ground international resources.
Professionals fluent in 35+ languages. 700+
employees in 7+ years. 100+ data scientists.

Experienced Team of Top Law Enforcement


and Security Veterans
✓ FBI Agents ✓ Chief Compliance
✓ DoD Executives Officers
✓ Intel Analysts ✓ Investigative
Researchers
✓ Compliance
Technology Leaders ✓ Banking Executives
✓ General Counsels
Maintaining industrial health for the financial
sector, governments and multi-national
Trusted by U.S. Regulators
corporations
US Department of Justice | Office of the
Comptroller of the Currency | Federal Reserve ✓ Over 30 of the World’s Top 50 Banks
Bank and more ✓ Over 150 of the Fortune 1000
✓ Over a Dozen Government Agencies and
Regulators

26 | TRADES: A Framework for Modern Third-Party and Supply Chain Risk Management
For more information, contact:
Brandon Daniels Carrie Wibben
President President,
bdaniels@exiger.com Exiger Government Solutions
cwibben@exiger.com

Erika Peters
Managing Director,
Global Head of TPRM & SCRM
epeters@exiger.com

Vancouver | San Antonio | Toronto | Silver Spring (DC Metro) | McLean | New York
London | Bucharest | Singapore | Sydney

www.exiger.com

You might also like