How do we keep the supply chain cyber secure?

Thema:
Supply chain security

Hostage software, phishing, vulnerable software and other forms of unauthorised access to servers and networks – all of which makes every company a potential prey for cybercriminals. And because of the interconnectedness in the chain, it is no longer enough to have one's own cybersecurity in order. Cybercriminals are increasingly hacking into their ultimate targets via suppliers and business partners.

Cybersecurity in the supply chain

Cybersecurity in the supply chain is a many-headed monster. It is clear that there is no 'silver bullet' to prevent problems, both structural and specific. However, that does not mean that every organisation should simply wait for the first incident to happen before taking action. TNO specifies three concrete steps towards improved digital security in the supply chain. You can read all about it in the paper "When the chain itself is the weakest link".

3 steps to digital security in the supply chain

Download the paper "When the chain itself is the weakest link"

Details of the paper

After reading the paper you will know more about:

  • The challenges of Chief Information Security Officers (CISOs) in the production chain . In addition to their own cyber resilience, they must also be aware of attacks or disruptions from parties they trust - but who are outside their circle of influence.
  • Three concrete steps towards improved digital security in the supply chain . How can organisations innovate to boost resilience against digital attacks, especially in complex chains.
  • Use Cases reveal how TNO, together with national and international partners, develops technologies to keep the supply chain digitally secure.

Get inspired

13 resultaten, getoond 6 t/m 10

Quantum computing: how can it serve your organisation?

Informatietype:
Article

Solving problems in real time with quantum computing applications? The huge computing power provides opportunities for AI, optimisation, and materials science.

Security monitoring and detection

Informatietype:
Article
Security Monitoring and Detection allows companies to proactively analyse their network traffic and data to identify suspicious patterns at an early stage.

Webinar: explanation of ASOP prototype modulair security platform

Informatietype:
Webinar
28 February 2022
1 aflevering

With the development of the first prototype modular security platform, we are taking a first step towards enabling automated risk management of cyber security operations for the benefit of strategic organisational objectives.

Tech companies and TNO join forces for further development of automated cybersecurity platform

Informatietype:
News
28 February 2022
KPN, SaaS, BiZZdesign, VMware and TNO have signed an agreement to develop an automated cybersecurity platform.

LANCELOT: new collaboration between IKNL and TNO

Informatietype:
News
22 November 2021
IKNL and TNO have entered a new partnership for the Lancelot project. This project will help to reduce the impact of cancer while preserving patients’ privacy.