Panoraysβ Risk Insights & Response Portal delivers real-time alerts on cyber risks impacting your organization and supply chain.
The portal identifies threats such as:
Vulnerabilities & Known Exploited Vulnerabilities (KEVs)
βZero-day attacks & active exploitations
βBreaches & Dark Web exposure
βCyber news and intelligence events
Each incident automatically maps the affected entities across your company, direct suppliers, and indirect suppliers, enabling fast response and traceability without leaving the platform.
π Accessing the Portal
Click the Shield icon in the left navigation bar to open the portal.
π Portal Overview
The portal displays:
Area | Description |
Left panel | List of detected incidents |
Right panel | Details of the selected event |
Impact banner | Shows who is affected (you / direct / indirect suppliers) |
Incident types include:
Vulnerabilities (including KEVs)
Breaches and cyber attacks
βZero-day reports
βCyber & data breach news
βDark Web alerts
π― Reviewing Incident Details
Select an incident to view detailed information in two views:
Description
Overview of what happened
βSource of identification
Links to findings / advisories / public references
Supply Chain Impact
Who was affected (your company, direct suppliers, indirect suppliers)
βConfirmed and potential exposure paths
βVendor-level summary
β‘οΈ This helps you prioritize impact and response based on blast radius.
βοΈ Responding to an Incident
If supplier action is needed, you can send a questionnaire directly from the portal:
Create a breach or incident questionnaire template in your Questionnaire Template Library
βReturn to the incident
βSelect Send Questionnaire
βChoose recipients and due date (default: 30 days)
β οΈ Only suppliers with at least one contact can receive questionnaires.
Sending a questionnaire automatically updates the incident status to In Progress.
π·οΈ Managing Incident Status
Statuses help track remediation progress:
Status | When to use it |
New | Automatically assigned when detected |
In Progress | Internal review or supplier follow-up has started |
Done | All remediation actions are completed |
Archive | No action required / for closed informational events |
You may also add Internal Notes to document communication, decisions, or findings.
π Filtering & Sorting
Use filters to refine the list of incidents:
Status
βType
βSupplier
βScope:
βImpacts my company
βImpacts direct suppliers
βImpacts indirect suppliers
This enables focused review based on responsibility and urgency.
β οΈ Insight Retention & Auto-Archiving
Inactive insights may be auto-archived
βAuto-archived insights stop recalculating
βArchived items are kept for 1 year, then deleted
βDeleted & archived items are tracked in the Activity Center
π§ Risk Insights & Cyber News β Reference Table
Criticality is a guideline β evaluate based on relationship & context.
Type | Criticality | Source | Meaning | How Identified |
KEV (CISA) | 3 | Findings | Known exploited vulnerability in use | Tech & version match |
Vulnerability (NVD) | 3 | Findings | Critical weakness requiring remediation | Affected tech match |
Technology Risk | 3 | Technology Center | Risk due to tool/configuration | Partial tech match |
Cyber Alert | 5 | Cyber News | Risk from threat intel sources | Matched to company |
Active Exploitation | 4 | Cyber News | Actively exploited vulnerability | Intel source match |
Zero-Day Attack | 5 | Cyber News | No patch available; urgent risk | Public disclosure match |
Data Breach | 5 | Cyber News | Sensitive data leaked/stolen | Company match |
Cyber Attack | β | Cyber News | Malicious / disruptive attack | Credible news source |
Social Engineering Attack | β | Cyber News | Targeted manipulation attempt | News + exposure match |
Cyber News | β | Cyber News | Relevant industry alerts or warnings | Keyword/company match |
Dark Web Alert | 4 | Dark Web Feed | Credentials/data surfaced online | Keyword + asset match |
π Summary
The Risk Insights & Response Portal empowers you to:
Detect cyber incidents in real time
βUnderstand supply chain exposure instantly
βPrioritize threats using filters and scope control
βEngage suppliers directly through questionnaires
βTrack remediation and maintain auditability
Use the portal to strengthen supply chain resilience and accelerate investigation, reporting, and compliance workflows β all in one place.