Black Kite

Black Kite

Speciality: Third-Party and Supply Chain Penetration Testing

Boston, United States 154 employees
[01] About

Black Kite is a private cybersecurity company specializing in third-party risk management software and solutions; 118 employees (+20.3% YoY growth), $6.2M annual revenue, founded in 2016 in Boston, MA • Provides active penetration testing services with at least annual assessments, emphasizing security testing and vulnerability management.

Black Kite is a leading third-party cyber risk management platform trusted by over 3,000 customers to manage every supplier and every risk across their extended ecosystem. Fueled by AI-powered intelligence and differentiated by the quality, transparency, and actionability of its data, Black Kite automates vendor monitoring and assessments, surfacing reliable insights into ransomware susceptibility, regulatory gaps, financial exposure, and more. With Black Kite, security and risk teams gain always-on visibility and trusted intelligence to act early, reduce exposure, and stay ahead of third-party threats.
[02] Services
Penetration Testing
Vendor Evaluation
Vendor Monitoring
Vendor Risk Response
Vendor Compliance
[03] Certifications
ISO 27001:2022

ISO 27001:2022: Origin and Industry Value


Origin


ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), first published in 2005 as ISO/IEC 27001. The standard evolved from the British Standard BS 7799-2, which was created in the late 1990s. The 2022 version represents the latest revision, updated to address modern cybersecurity challenges including cloud computing, remote work, and emerging technologies. It was created to provide organizations with a systematic framework for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS).


Industry Importance


ISO 27001:2022 is highly valued because it provides internationally recognized proof that an organization takes information security seriously and has implemented comprehensive controls to protect sensitive data. The certification demonstrates to clients, partners, and stakeholders that a company follows best practices for managing cybersecurity risks, often becoming a prerequisite for doing business with government agencies and large corporations. Organizations benefit from reduced security incidents, improved customer trust, competitive advantage in procurement processes, and potential compliance with various legal and regulatory requirements. The standard's risk-based approach ensures that security measures are proportionate and aligned with actual business threats.

SOC 2 Type II

SOC 2 Type II Certification


Origin


SOC 2 (Service Organization Control 2) was developed by the American Institute of Certified Public Accountants (AICPA) in 2011 as part of their Service Organization Control reporting framework. It was created to address the growing need for standardized security and privacy assurance as more organizations began storing data in the cloud and relying on third-party service providers. The certification was designed to evaluate how well service organizations manage customer data based on five "Trust Services Criteria": security, availability, processing integrity, confidentiality, and privacy. Type II specifically requires organizations to demonstrate these controls over a minimum period of time (typically 3-12 months), rather than just at a single point in time.


Industry Value


SOC 2 Type II certification is highly valued because it provides independent verification that a company has implemented and maintained robust security controls over an extended period. For service providers, achieving this certification demonstrates credibility and commitment to data protection, often becoming a competitive differentiator and a prerequisite for winning enterprise clients. Many organizations, particularly in healthcare, finance, and technology sectors, require their vendors to be SOC 2 Type II compliant before sharing sensitive data or establishing business relationships. The certification gives customers confidence that their service providers have been audited by qualified third parties and meet industry-recognized standards for protecting information assets.