Skip to content

“Are you certified?” may become the most used phrase in business this year.

By Edward Tuorinsky

DTS CEO, Edward Tuorinsky, shares his insights with Intelligent CXO, on a pivotal growth opportunity for businesses in 2025: cybersecurity compliance and supply chain risk management (C-SCRM). As the regulatory landscape evolves and cybersecurity threats grow, businesses must adapt to protect their operations and partnerships. Edward discusses why “Are you certified?” will become a crucial question for businesses this year and how Federal mandates like CMMC are reshaping the cybersecurity landscape.

“Are you certified?” may become the most used phrase in business this year. I predict cybersecurity compliance will be a significant growth opportunity for 2025, specifically cybersecurity supply chain risk management (C-SCRM).

Assessing and managing the cybersecurity risk of all partners with whom you share data connections is an important part of each company’s security posture. Bad actors prey on the weakest link, often smaller companies, intending to gain access to a bigger, more lucrative company’s system.

Believe it or not, C-SCRM is trending because of the US Government’s Department of Defence (DoD). After years of cyberattacks, breaches and viruses, programs across the Federal government are helping secure the country’s critical infrastructure by establishing baseline cybersecurity standards for contractors, but with wide-ranging implications.

The DoD’s Cybersecurity Maturity Model Certification (CMMC) requires all 200,000+ contractors to prove that they meet minimum cybersecurity standards to qualify for new or renewing contracts. As mandates trickle down, thousands of subcontractors, vendors and suppliers to these companies will need proof of their security compliance, too.

Federal mandates for contractors represent a significant area for growth for commercial markets. Companies may find their supply chains are demanding that they invest in cybersecurity that meets national standards and documentation or certification audits that prove their security.

Companies with long-standing or niche supply chains have been reluctant to cut ties with a partner or supplier over cybersecurity, but I think we’ll see that change this year. Risk is a powerful motivator, and vetting your supply chain is one of the most cost-effective cybersecurity moves companies can make. While cyberdefences can barely keep up with evolving threats, supply chain security bolsters the entire ecosystem.

What will it mean to vet your supply chain? Asking for proof that the company has controls in place and is following policies and procedures to protect people, data and systems. With non-disclosures in place, we’ll see companies asking for System Security Plans and third-partycertifications like ISO, SOC or CMMC. We’ll also hear about organisations cutting ties with those who don’t have the documentation or aren’t up to standards.

Cybersecurity wasn’t part of the conversation with partners and vendors five years ago. Today, the regulatory environment and the need to secure the country’s critical infrastructure have made it an imperative. Look for cybersecurity to be a major area for growth in 2025.

Read the full article here: Intelligent CXO: Editor’s Question – What Challenges and Growth Opportunities Do You Predict for Businesses in 2025?

 

About DTS

Share this Article
More Insights
  • Scope What Matters: Building a Focused and Sustainable Security Program
    Team DTS February 23, 2026

    A security program becomes repeatable only when it focuses on the systems and processes that truly matter. Federal guidance such as NIST SP 800-171…

  • Information Governance and CUI: Establishing Structure for CMMC Compliance
    Team DTS February 18, 2026

    February is recognized as Information Governance Month, with February 19 marking Global Information Governance Day. For organizations supporting federal contracts, information governance defines how…

  • 8 Essential Data Privacy Practices for Federal Contractors
    Team DTS January 27, 2026

    A clear, actionable guide to protecting sensitive information and preparing for evolving privacy expectations Introduction Data Privacy Week arrives at a time when organizations…

  • Strengthening Identity Integrity and MFA Controls to Prevent Credential Theft
    Team DTS December 4, 2025

    Identity is the core of modern cybersecurity. Federal frameworks, including NIST SP 800-171 and CMMC, consistently emphasize maintaining traceable, unique identities and enforcing multi-factor…

  • A Practical Starting Point for CMMC Readiness
    Jamie Repesh November 24, 2025

    CMMC requirements are now being incorporated into Department of Defense (the Department) contracts following the November 10 effective date of DFARS 252.204-7021. With the…

  • Reducing Cybersecurity Risk In 2025: Consider A Supply Chain Strategy
    Edward Tuorinsky February 7, 2025

    DTS CEO, Edward Tuorinsky, shares his insights with Forbes Business Council, on reducing cybersecurity risk in 2025: consider a supply chain strategy. Despite increased…

  • Building A Motivated Team: Hiring Advice For The Workforce You Need Next
    Edward Tuorinsky December 26, 2024

    It’s not often that you get business advice from the Pat McAfee Show, but a few weeks ago, college football coaching great Nick Saban…

  • Budget Considerations for Cybersecurity
    Edward Tuorinsky December 23, 2024

    We’ve entered an era of new business risk. Our fast-evolving IT landscape comes with even faster-evolving cybersecurity threats. Companies understandably want to protect their…

  • Build The Factory: How To Improve Service Employee Retention
    Edward Tuorinsky November 25, 2024

    Since the pandemic, the workforce has experienced volatility and a growing disconnect between employees and their employers. Pay transparency allows employees to shop their…