is a completely different model for running those systems .”
Ultimately , leaders want to obtain a view over all the assets in their operations , whether they are decades -old systems or the very latest software containers that exist for minutes at a time .
Matt adds : “ It ’ s impossible to secure assets you don ’ t know about .”
Managing third-party risk As is well documented , the security of supply chains extends far beyond an organisation ’ s immediate operations , encompassing a complex network of third-party relationships .
These include suppliers , contractors , vendors and beyond , with each presenting potential vulnerabilities .
Manu believes a robust third-party risk management programme is a “ must -have ” and should involve identification of critical suppliers and deep due diligence on suppliers during the onboarding process – including assessment of their cyber risk posture . supplychaindigital . com 117