Founding Partnerships Open · 2026

Value Chain Risk Institute

"Secure the Value, Not Just the Network."

The trusted neutral clearinghouse for vendor cybersecurity posture data.

Independent regulatory bodies across the EU, US, and Japan have converged on the same answer to the same question at roughly the same moment. That convergence is not coincidence. It's a structural signal — and it points to something that doesn't exist yet.

The clearinghouse doesn't exist yet. That's what VCRI is building.

35%
of breaches involve third parties
rising
4 yrs
consecutive increase
VCRI
Real data
not self-reported surveys

The Causal Chain

Why Regulators Everywhere Arrived at the Same Answer at Once

Within a 24-month window, independent regulatory bodies across the EU, US, and Japan independently converged on roughly the same answer to the same question. This isn't regulatory fashion. It's the endpoint of a specific causal sequence that matured simultaneously.

2010s — The Structural Vulnerability Was Created

Cloud adoption expanded vendor dependency without scaling trust infrastructure

Organizations that once operated their own infrastructure became dependent on dozens to hundreds of external vendors. The oversight mechanisms — vendor questionnaires — were designed for a world with a handful of critical third-party relationships. In a world of hundreds, the questionnaire model became a checkbox exercise producing false confidence. The vulnerability accumulated quietly, invisibly, over a decade.

2020 — Proof of Concept

SolarWinds demonstrated the attack economics at scale

Attackers understood vendor-as-vector before defenders did. The logic is straightforward: compromise one vendor, gain access to every client who trusts that vendor. SolarWinds was the publicly visible proof of concept — a single supply chain compromise that reached hundreds of organizations including US federal agencies. Once the proof of concept was visible, frequency increased. The pattern became statistically significant.

2022–2024 — The Measurement Problem Resolved

Breach attribution matured; third-party risk became measurable

For years, "what percentage of breaches involve third parties?" was unanswerable. Forensic capabilities improved. Mandatory disclosure requirements (GDPR, SEC rules, NIS2) created reporting obligations. The data began to accumulate. Third-party breach attribution went from anecdote to statistic — 29% in one period, rising to 35% the next. Once measurable, the regulatory lever existed.

2025–2026 — The Regulatory Cascade

Independent jurisdictions converged on the same requirement

Regulations don't emerge in isolation — they follow templates. Once one major jurisdiction does the intellectual work of establishing that vendor risk assessment must be independent and continuous — not self-reported and periodic — others follow. The EU moved first with DORA and NIS2. The US adapted (FedRAMP 20x, SEC disclosure rules). Japan followed. The cascade is structural, not coincidental.

Active Regulatory Mandates — Independent Jurisdictions, Same Requirement

DORA
EU Financial Services · Enforced 2025
NIS2
EU Critical Infrastructure · Active
EU ICT Toolbox
Supply Chain Mandate · Feb 2026
FedRAMP 20x
Machine-Readable · Sept 2026 deadline
ISMAP
Japan · Structured Assessment
SEC Disclosure
Third-Party Breach · Required

These frameworks were developed independently, cite different legal authorities, and emerged from different political processes. Their convergence on the same requirement is a structural signal, not coordination.

What the convergence reveals: The mandates create requirements for some vendors in some contexts. They don't create the infrastructure for knowing vendor posture across supply chains as a whole — because supply chains don't respect regulatory perimeters. A financial institution under DORA still has vendors who aren't financial institutions. A US federal contractor under FedRAMP still has subvendors not seeking federal authorization. The frameworks have named the problem. What's missing is the shared data infrastructure that makes assessment possible at the scale the problem demands. That infrastructure doesn't exist yet.

The Structural Problem

Vendors Grading Their Own Homework

Every major third-party breach follows the same pattern: an organization trusted a vendor's security posture based on the vendor's own claims, and found out the claims were wrong when something burned. The problem is structural, not accidental.

The Self-Reporting Problem

A vendor filling out a security questionnaire has every incentive to present the most favorable picture. The organization receiving it has no independent data to validate against. The entire transaction is built on an assumption that fails in exactly the situations where accurate posture data matters most.

The Decay Problem

A compliance assessment is valid for approximately five minutes after it's filed. The threat landscape changes daily. Annual questionnaires describe a vendor's posture on the day the form was submitted — which is not the day you need to know. Risk-to-action in the traditional model: 6 months.

The Perimeter Problem

External scanning tools (the major commercial category) measure observable surface area — exposed ports, leaked credentials, certificate status. They infer what's inside from what they can see from the internet. That's not assessment. That's pattern-matching on symptoms.

The organizations affected by third-party breaches are not naive — many have sophisticated security programs. What they lack is independent data about the vendors in their ecosystem. They're navigating with instruments calibrated by the people they're supposed to be evaluating. SolarWinds. Kaseya. MOVEit. Target. Each time, a trusted vendor was the door — and no one knew it was open.

The Infrastructure Response

The Trusted Neutral Clearinghouse

The credit bureau analogy is the right one: credit bureaus don't compete with banks. They hold the assessment function at arm's length from the transaction. The equivalent for vendor cybersecurity posture doesn't exist. VCRI is building it.

1

Vendors Submit Live Telemetry

Real security data from actual tools — not a questionnaire. Automated API ingestion preferred; vendors who allow it earn higher trust scores. For FedRAMP vendors: OSCAL-formatted packages map directly into the VCRI schema.

2

VCRI Holds It in Escrow

Data is normalized through the Secure Controls Framework (SCF) — 100+ compliance frameworks unified to a single master baseline. Evaluated against CMM maturity levels. The CAM matrix maps posture across six TIPPSS dimensions.

3

The Value Chain Sees Reality

Every organization depending on that vendor gets continuous, dollar-denominated risk visibility. Not a letter grade. A dollar figure: the revenue or mission value at stake, updated continuously as incident data and posture signals change.

Dollar-Denominated Risk (VCAR)

VCRI outputs dollar figures, not traffic lights alone. The VCAR formula: Process Value × Industry Incident Duration = Dollar at Risk. Every vendor risk decision can be made in the same terms as every other business decision.

Portable Trust for Vendors

Vendors who maintain a strong VCRI profile share it with every client on the platform. Answer once. Share everywhere. Questionnaire fatigue eliminated across their entire customer base — the rational choice is transparency, by design.

Structural Differentiation

Why This Is Structurally Necessary, Not Just Different

Every commercial tool in this space is solving the symptom — better questionnaire management, better external scanning. VCRI solves the structural problem.

Inside data, not external inference. External scanning tools (BitSight, SecurityScorecard, UpGuard) infer what's inside from observable internet signals. That's correlation, not attestation. A vendor can score well externally while having catastrophic internal process failures. VCRI vendors submit live telemetry from inside their systems. The data isn't inferred — it's real.
Non-profit. No conflicts. The assessment function at arm's length. Commercial ratings companies are paid by the buyers. That creates pressure — subtle or otherwise — to maintain relationships over accuracy. VCRI's only constituency is accuracy. No skin in the outcome. That's why credit bureaus aren't commercial lenders, and why VCRI can't be a security product vendor.
Cross-framework, cross-jurisdiction, cross-industry. Each regulatory mandate covers a slice: DORA covers EU financial services, FedRAMP covers US federal cloud. Supply chains don't respect those perimeters. VCRI normalizes vendor posture across all frameworks (via SCF), all jurisdictions, all industries — the only response that works at the structural level the problem demands.
The honesty mechanism is built in. Vendors who allow automated data access receive higher trust scores. Vendors who package their own submissions receive lower ones. The platform makes transparency the rational choice by design — not by appeal.

Landscape Comparison

Dimension Security Ratings
(BitSight, SSC, UpGuard)
TPRM Workflow
(ProcessUnity, Venminder)
VCRI
Data source External scan / inference Vendor self-report Vendor-submitted telemetry, independently normalized
Business model Commercial SaaS Commercial SaaS Nonprofit membership
Conflict of interest Aligned with buyers Aligned with buyers Neutral — no commercial stake
Cross-framework normalization Proprietary scale Framework-specific SCF — 100+ frameworks unified
Portable vendor trust No No Yes — answer once, share everywhere
Dollar-denominated output No No Yes — VCAR: $ at risk per process
Jurisdiction scope US-centric US-centric US · EU · Japan by design

Leadership

Built by the Architects of Modern Cybersecurity

The people who wrote the standards, built the frameworks, and led security at the world's most critical organizations — building the infrastructure layer the entire industry needs.

Joshua Marpet
Executive Director

Co-author CMMC v1; NIST contributor; IANS Faculty; CAM co-author. Security Weekly co-host. Ex-cop, ex-fireman, historical blacksmith.

Mary Ann Davidson
Board

Former Chief Security Officer, Oracle — 40 years. Architect of Oracle's Unbreakable security program.

Allan Friedman
Board

"Father of SBOM." Fmr. CISA/NTIA. Created the framework the U.S. government now requires for software component disclosure.

Mitch Parker
Board · CAM Co-Author

CISO, Indiana University Health. Co-Vice Chair IEEE/UL 2933 — the standard underlying VCRI's verification methodology.

Lee Neely
Board

Senior Cyber Analyst, Lawrence Livermore National Laboratory. SANS mentor and instructor.

Tom Cornelius
Board · Technology Partner

Founder, Secure Controls Framework (SCF) — the master control library mapping 100+ compliance frameworks. U.S. Army veteran.

Robert Hill
Board · Technology Partner

Founder & CEO, Cyturus. 30+ years in regulatory compliance and supply chain risk management.

Paul Asadoorian
Board

Founder, Security Weekly (160K audience). Principal Security Researcher, Eclypsium — firmware & hardware supply chain.

Michael Shea
Board

UN Transparency Protocol Adoption Group Lead. Digital Product Passports — global supply chain transparency at scale.

Framework — Tom Cornelius, SCF Founder · VCRI Board

Security
=
Prevent
Compliance
=
Prove
Resilience
=
Survive

"Be less than all three, and you're taking on risk." VCRI measures all three — continuously, across your entire vendor ecosystem.

Publications

Technical Documentation

Full methodology, technical architecture, and regulatory alignment documentation.

Founding Round

$3.1M

To build, staff, and operationalize the clearinghouse infrastructure — the data layer that supply chains need and regulators are now requiring.

Months 1–6: 1 government agency onboarded; CRIBL pipeline live; OSCAL ingestion operational
Months 7–12: 10 vendors from agency ecosystem active; first value chain dashboards live
Year 2: Recurring fee revenue covers operations; self-sustaining nonprofit research mission

Why April 2026 matters: The EU ICT Supply Chain Security Toolbox was published in February. The FedRAMP machine-readable mandate deadline arrives in September. SusHi Tech Tokyo (April 27-29) lands at the exact moment when regulatory convergence is most visible and the gap between what's mandated and what's available is most apparent. The timing is structural, not lucky.

Start the Conversation

The clearinghouse doesn't exist yet. We're building it.

Government agencies, critical infrastructure operators, and strategic partners who want to be part of defining how supply chain risk is assessed at global scale — the founding conversation starts here.

info@valuechainrisk.org

ValueChainRisk.org