Tighter regulation makes industrial supply-chain cybersecurity even more important
Most OT security professionals say their organizations are at risk because they do not know the security practices of relevant third parties and cannot mitigate cyber risk across the OT external supply chain. This article explores supply chain challenges and offers recommendations for how to overcome them.
You can’t secure what you don’t know. DNV Cyber maps your supply chain to understand risks and identify stakeholders, assets, and weakest links. We assess and improve your governance and management models to optimize your supply chain cyber risk management. We develop a supply chain cybersecurity implementation plan, and support with incident response to help control and limit damage.
Supply chains are an attractive target for cyber-attacks because they potentially provide a single-entry point to multiple companies’ environments. While awareness of the importance of supply chain security is growing, you can’t secure what you don’t know. Companies often have an incomplete risk picture. Without knowing the weakest links in their supply chain, they can’t prioritise and strengthen the weak points.
Too many companies don't map, verify, or create an overview of the security threats to their whole supply chain. They don't have an overview of the assets they have. An inventory is needed.
Security requirements should be included in vendor contracts, but companies are often missing supply chain security governance principles. By defining requirements up front, and regularly reviewing suppliers against those requirements, understanding supply chain security becomes less of a black box.
Companies are investing more in cybersecurity, stepping up efforts to identify cyber vulnerabilities and taking steps to defend IT/OT environments. But it will make little difference if the cybersecurity of their supply chains is not similarly strengthened.
- Global Sales Director
- DNV Cyber
DNV Cyber works with you to map your supply chain to understand risks and identify stakeholders, assets, and weak links – whether people, process, or technology. We assess and improve your governance and management models to optimise your supply chain cyber risk management. We take an end-to-end approach to securing your supply chain, also covering the business and legal aspects.
Through a supply chain cybersecurity implementation plan, we turn understanding into action. We help you prioritize actions and investments to cost-efficiently improve the cybersecurity of your supply chain in a way that improves operational efficiency and convenience. We offer rapid cybersecurity incident response to help you control and limit potential damage.
The threat landscape is contantly changing. To guard against evolving threats, we deliver threat assessment and ongoing supply chain cybersecurity optimization.