John, how can cybersecurity teams ensure their customers, suppliers, contractors, and others in the software supply chain are doing what they should to protect their systems? Are the connections between the organization and the partner systems adequately secured?