Dashboard
Supplier portfolio overview — Phase 1 intake results
0
Total Suppliers
0
Intake Completed
0
P4 Critical
0
Intake Pending
0
Assessments Sent
0
Assessments Done
Supply Chain Portfolio Matrix
Dependency × Value
HIGH
← DEPENDENCY →
LOW
Bottleneck
High dependency · Low value
Strategic
High dependency · High value
Routine
Low dependency · Low value
Value
Low dependency · High value
LOW
← VALUE →
HIGH
Complete Phase 1 intakes to see suppliers plotted here
Banding Distribution
P1 Low
P2 Medium
P3 High
P4 Critical
Cyber Security Maturity Overview
No Phase 2 assessments completed yet. Send assessments to suppliers and track their cyber security maturity here.
Recent Intakes
| Supplier | SCOR Stage | Score | Banding | Quadrant | Date |
|---|---|---|---|---|---|
| No intakes completed yet. Add a supplier to get started. | |||||
Suppliers
Manage your supplier portfolio and Phase 1 intake assessments
No suppliers yet
Add your first supplier to start the Phase 1 intake process.
Phase 2 Assessments
Manage and track cyber security assessments sent to suppliers
Sent Assessments
| Supplier | Status | Sent | Completed | Respondent | Overall Maturity | Actions |
|---|---|---|---|---|---|---|
| No assessments sent yet. | ||||||
Manual — Methodology
Background, rationale, and guidance for the VSRA approach