Supply Chain Security

Connected operational environments have led to rising cybersecurity risks throughout the supply chain, prompting an increased need to focus on and develop appropriate response strategies, policies, processes, and procedures. Enterprises must identify, assess, select, and implement Risk Management processes while mitigating appropriate controls. These measures would help manage cybersecurity risks throughout the supply chain.

Identifying cybersecurity risks throughout the supply chain is complicated by the information asymmetry that exists between organizations, their suppliers, and service providers. As a result, organizations must build their cybersecurity supply chain risk considerations and requirements into their acquisition processes and highlight the importance of risk monitoring. In addition, as cybersecurity risks can crop up at any point in the lifecycle or within any link in the supply chain, organizations must also consider “potential” vulnerabilities.

Forescout report warns of growing security risks to critical infrastructure as OT/ICS exposed data escalates
Forescout report warns of growing security risks to critical infrastructure as OT/ICS exposed data escalates
New CGCYBER report warns of cybersecurity risks in marine environment due to network-connected OT systems
New CGCYBER report warns of cybersecurity risks in marine environment due to network-connected OT systems
Ukrainian CERT details malicious plan by Sandworm group to disrupt critical infrastructure facilities
Ukrainian CERT details malicious plan by Sandworm group to disrupt critical infrastructure facilities
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Mandiant exposes APT44, Russia's Sandworm cyber sabotage unit, targeting global critical infrastructure
Mandiant exposes APT44, Russia’s Sandworm cyber sabotage unit, targeting global critical infrastructure

Industrial Cyber Experts

Sinclair Koelemij
Vulnerability handling according to the European Cyber Resilience Act (CRA)
So far, cybersecurity regulations in Europe have been primarily driven by the NIS2 regulations. The NIS2 regulations are... Read full story
Jonathon Gordon
Manufacturing – Supply Chain Security
Welcome back to our Manufacturing Cybersecurity series! This week, we’re diving headfirst into the fascinating topic of Supply... Read full story
Kevin Kumpf
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity
Incorporating a zero-trust framework into OT (operational technology) and ICS (industrial control system) environments becomes imperative in addressing... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story