Supply Chain Security

Connected operational environments have led to rising cybersecurity risks throughout the supply chain, prompting an increased need to focus on and develop appropriate response strategies, policies, processes, and procedures. Enterprises must identify, assess, select, and implement Risk Management processes while mitigating appropriate controls. These measures would help manage cybersecurity risks throughout the supply chain.

Identifying cybersecurity risks throughout the supply chain is complicated by the information asymmetry that exists between organizations, their suppliers, and service providers. As a result, organizations must build their cybersecurity supply chain risk considerations and requirements into their acquisition processes and highlight the importance of risk monitoring. In addition, as cybersecurity risks can crop up at any point in the lifecycle or within any link in the supply chain, organizations must also consider “potential” vulnerabilities.

Slicing through Biden’s NSM-22 amidst ongoing need to shore up critical infrastructure security and resilience
Slicing through Biden’s NSM-22 amidst ongoing need to shore up critical infrastructure security and resilience
Vulnerabilities in GE Healthcare Vivid ultrasound system could allow malicious insiders to install ransomware, access patient data
Vulnerabilities in GE Healthcare Vivid ultrasound system could allow malicious insiders to install ransomware, access patient data
Elevating industrial cybersecurity: Insights from the 2024 RSA conference
Elevating industrial cybersecurity: Insights from the 2024 RSA conference
Global alarm intensifies as state-sponsored cyberattacks raise risks to critical infrastructure, national security
Global alarm intensifies as state-sponsored cyberattacks raise risks to critical infrastructure, national security
CISA issues ICS advisories covering hardware vulnerabilities in Rockwell, Mitsubishi Electric equipment
US CISA issues ICS advisories on hardware vulnerabilities in Rockwell Automation, alpitronic, Delta Electronics

Industrial Cyber Experts

Jonathon Gordon
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Organizations across the industrial cybersecurity space are constantly dealing with challenges including software breaches, hardware vulnerabilities, supply chain... Read full story
Sinclair Koelemij
Vulnerability handling according to the European Cyber Resilience Act (CRA)
So far, cybersecurity regulations in Europe have been primarily driven by the NIS2 regulations. The NIS2 regulations are... Read full story
Kevin Kumpf
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity
Incorporating a zero-trust framework into OT (operational technology) and ICS (industrial control system) environments becomes imperative in addressing... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story