{"id":6957,"date":"2022-03-16T13:02:18","date_gmt":"2022-03-16T11:02:18","guid":{"rendered":"https:\/\/escp.eu\/thechoice\/?p=6957"},"modified":"2024-10-17T12:35:29","modified_gmt":"2024-10-17T10:35:29","slug":"supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem","status":"publish","type":"post","link":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/","title":{"rendered":"Supply-chain attacks and the delicate fabric of our IT ecosystem"},"content":{"rendered":"\n<p class=\"has-drop-cap h-fs-20 h-fw-600 h-mb-20\">During the past couple of years, the number of supply-chain attacks has surged, and they have become one of the most concerning threats to governments, organisations, and individual citizens.<\/p>\n\n\n\n<p><strong>Supply-chain attacks are a particular category of cyberattacks that target and take advantage of vulnerabilities in the IT supply chain<\/strong>. <\/p>\n\n\n\n<p>Today&#8217;s digital landscape has grown into a vast network of hardware and software, operating systems, applications, marketplaces and app stores, websites and web applications, cloud computing, algorithms and protocols. Supply-chain attacks target vulnerabilities hidden within this intricate technological fabric.<\/p>\n\n\n\n<p>Traditionally, cyberattacks have been carried out by identifying and exploiting a weak link within the victim&#8217;s broader IT infrastructure. Depending on the nature of the attack, the targeted link can be a hardware or software component. <\/p>\n\n\n\n<p>Sometimes, as in the case of social-engineering attacks, attackers may decide to target the human element of a system, for example by tricking an employee into revealing some confidential company information or giving access to a private infrastructure.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>In the case of supply-chain attacks, the way of least resistance to penetrate an organisation is not identified within the organisation itself, but rather in one of the products or services that the organisation buys from a third-party vendor.<\/p><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Supply-chain attacks typically take place in two steps. <\/h2>\n\n\n\n<p>First, a particular IT vendor is targeted and some of its systems or products are compromised. Second, the compromised vendor is used by the attacker as a stepping stone (or &#8220;attack vector&#8221;) to reach the vendor\u2019s customers, their final targets. Sometimes the chain can be longer and multiple products or vendors may be exploited before reaching the final victims.<\/p>\n\n\n\n<p><strong>Similar to other cyberattacks, the objectives behind a supply-chain attack are usually to access confidential information and to take control of IT systems with the ultimate goal of monetary gain, e.g. via some form of ransom or by reselling data on the black market. Some sophisticated attacks deployed by state-level actors may even be driven by political objectives.<\/strong><\/p>\n\n\n\n<p>Due to their complexity, the amount of resources required, and the level of coordination involved, supply-chain attacks are usually traced back to so-called Advanced Persistent Threat (ATP) actors, i.e. long-standing and well-organised groups.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SolarWinds Orion: the most notorious supply-chain attack<\/h2>\n\n\n\n<p>In December 2020 the IT world woke up to one of the most serious examples of supply-chain attacks ever. As revealed in their <a href=\"https:\/\/web.archive.org\/web\/20201214203645\/https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> of 13th December 2020, the security company FireEye had recently discovered a piece of malware that was being distributed as an update for the Orion platform. <\/p>\n\n\n\n<p><a href=\"https:\/\/web.archive.org\/web\/20201214092129\/https:\/\/www.solarwinds.com\/orion-platform\" target=\"_blank\" rel=\"noreferrer noopener\">Orion<\/a>, by the American IT company SolarWinds, was marketed as a powerful network and IT infrastructure monitoring software. The product was widely used by an array of international clients from both the private and public sectors, including various government bodies from the US, the EU and the UK, and large IT companies such as Microsoft, Intel, and Cisco.<\/p>\n\n\n\n<p>The attacker had inserted &#8220;malicious code into legitimate software updates for the Orion software&#8221; that allowed remote access into the victim&#8217;s environment.<\/p>\n\n\n\n<p><strong>The scenario exemplified by the Orion attack is as bad as things can get from a cybersecurity perspective. While the actual impact of the attack on its victims inevitably varies on a case-by-case basis, in the most severe circumstances attackers were able to get full undetected control of the victims&#8217; systems.<\/strong><\/p>\n\n\n\n<p>This means that sensitive data can be stolen, confidential communications monitored, and information&#8217;s integrity compromised.<\/p>\n\n\n\n<p>It was estimated that around 18000 Orion customers were affected by the attack. No one knows exactly the extent of the damage, and estimates go from the 90 million USD in insurance claims estimated by a <a href=\"https:\/\/web.archive.org\/web\/20210116020021\/https:\/\/www.crn.com\/news\/security\/solarwinds-hack-could-cost-cyber-insurance-firms-90-million\" target=\"_blank\" rel=\"noreferrer noopener\">report<\/a> from CRN.com to other experts who estimated upwards to <a href=\"https:\/\/www.govtech.com\/security\/solarwinds-hack-recovery-may-cost-upward-of-100b.html\" target=\"_blank\" rel=\"noreferrer noopener\">100 billion in damages<\/a>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>One of the reasons behind the growing number of supply-chain attacks can be found in the high reward-vs-effort ratio of these attacks.<\/p><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">A surge in cases<\/h2>\n\n\n\n<p>Supply-chain attacks have seen a worrying surge in the past couple of years. The phenomenon is now widely discussed by governments and public bodies all over the world. In an <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Executive Order<\/a> released by the US President Biden in May 2021, supply-chain security was identified as vital for &#8220;<em>the Federal Government&#8217;s ability to perform its critical func<\/em>tions&#8221; and was at the centre of numerous action points.<\/p>\n\n\n\n<p>According to the EU Agency for Cybersecurity (ENISA), <a href=\"https:\/\/www.enisa.europa.eu\/publications\/threat-landscape-for-supply-chain-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">at least 25 software supply-chain attacks were carried out between January 2020 and July 2021<\/a>. The agency also predicted a four-fold increase of supply-chain attacks over the course of 2021, and subsequent reports by <a href=\"https:\/\/info.revenera.com\/SCA-RPT-OSS-License-Compliance-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">Revenera<\/a> and <a href=\"https:\/\/info.aquasec.com\/argon-supply-chain-attacks-study\" target=\"_blank\" rel=\"noreferrer noopener\">Aqua Security<\/a> confirmed this trend.<\/p>\n\n\n\n<p>In October 2021, the cybersecurity company BlueVoyant reported the results of a <a href=\"https:\/\/www.bluevoyant.com\/resources\/managing-cyber-risk-across-the-extended-vendor-ecosystem\/\" target=\"_blank\" rel=\"noreferrer noopener\">survey<\/a> that involved around twelve hundred managers responsible for supply-chain and cyber-risk management.<\/p>\n\n\n\n<p>The report confirms that 93% of the surveyed companies had suffered a cybersecurity breach because of weaknesses in their supply chain. 97% of the surveyed companies had been negatively impacted by a cybersecurity breach that occurred in their supply chain.<\/p>\n\n\n\n<p>Worryingly, the average number of breaches experienced in the 12 months leading up to the report&#8217;s publication had grown 37% over the previous period.<\/p>\n\n\n\n<p><strong>One of the reasons behind the growing number of supply-chain attacks can be found in the high reward-vs-effort ratio of these attacks.<\/strong> Given how costly compromising one particular supplier can be, this can unlock huge potential in terms of the number of the supplier&#8217;s customers that can eventually be targeted. <\/p>\n\n\n\n<p>From an attacker&#8217;s point of view, the supply-chain structure can be leveraged as an amplifier, where compromising one individual vendor makes all its customers vulnerable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to protect ourselves and our businesses in this increasingly turbulent digital landscape?<\/h2>\n\n\n\n<p>In general terms, it is important that all organisations embrace a culture of cyber security. Nowadays, all managers (and one could say, all employees) are expected to have some level of cybersecurity literacy. <\/p>\n\n\n\n<p>Digital threats must be factored into all important decisions. Cybersecurity budgets must be carefully sized in light of the cost of potential security failures. A trove of examples from the recent news illustrates how a casual approach to security can be very costly.<\/p>\n\n\n\n<p>In terms of roles and responsibilities, <strong>it is important that all organisations, including small and medium ones, have well-defined cybersecurity roles<\/strong>. This sets the foundation to promote a security culture throughout the organisation. <\/p>\n\n\n\n<p>Clear roles and responsibilities will make it easier to react to an incident should a security breach or a failure occur, and to ensure business continuity.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Nowadays, all managers (and one could say, all employees) are expected to have some level of cybersecurity literacy. Digital threats must be factored into all important decisions.<\/p><\/blockquote>\n\n\n\n<p><strong>From a more technical point of view, small and medium organisations should start asking simple questions.<\/strong><\/p>\n\n\n\n<p>Does my organisation have a systematic and regularly updated inventory of digital assets, such as data, devices, servers, and third-party services? Does the list include who within the organisation can access or is responsible for each particular asset? Has a risk assessment been completed that, for each digital asset, establishes access lists, backup strategies, and encryption requirements? When it comes to business continuity, do we have clear targets in terms of Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO)?<\/p>\n\n\n\n<p>An approach increasingly adopted in business-critical contexts is that of reproducible software, i.e. software whose origin and integrity can be guaranteed by means of cryptographic techniques, which is particularly relevant for the ever-increasing proportion of open-source software dependencies incorporated in practically every organisation\u2019s software system, of which there is <a href=\"https:\/\/www.activestate.com\/resources\/datasheets\/software-supply-chain-security-survey-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">often too little awareness<\/a>.<\/p>\n\n\n\n<p>There are also numerous cybersecurity frameworks that businesses can adopt to guide their cybersecurity approaches. Examples are the <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Framework<\/a> provided by the US National Institute of Standards and Technology (NIST) and the <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/caf\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Assessment Framework<\/a> from the UK National Cyber Security Centre (NCSC). While different frameworks have different nuances and strengths, any framework is probably better than no framework at all. <\/p>\n\n\n\n<p>If your organisation does not have one in place and relies on a custom-made approach alone, this might need some rethinking.<\/p>\n\n\n\n<p><strong>More often than not, security is a matter of common sense. <\/strong>However, in a context where digital technologies and cyber threats evolve so rapidly, organisations need to make a conscious effort and carefully think through their approach to security. It is an investment made today that will most certainly pay for itself in the future.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-accent-background-color has-accent-color is-style-wide\"\/>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"626\" src=\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/fabio_natali.jpg\" alt=\"Photo of Fabio Natali\" class=\"wp-image-6965\" srcset=\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/fabio_natali.jpg 626w, https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/fabio_natali-300x300.jpg 300w, https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/fabio_natali-150x150.jpg 150w, https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/fabio_natali-96x96.jpg 96w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><a href=\"https:\/\/www.linkedin.com\/in\/fabio-natali-839888a7\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fabio Natali<\/a> is a London-based software architect, information security advisor, and consultant. His interests lie at the intersection of technology, ethics, and politics. As an information security consultant, he has worked with and provided support to numerous investigative journalists and human rights organisations in the UK and abroad. Fabio is a co-founder and director of Reckon Digital, a London-based software company specialising in data science and process optimisation.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"415\" src=\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/gabriel_scali.jpg\" alt=\"Photo of Gabriel Scali, computer scientist\" class=\"wp-image-6966\" srcset=\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/gabriel_scali.jpg 400w, https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/gabriel_scali-289x300.jpg 289w, https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/gabriel_scali-150x156.jpg 150w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><a href=\"https:\/\/www.linkedin.com\/in\/gabriel-scali\/\" target=\"_blank\" rel=\"noreferrer noopener\">Gabriel Scali<\/a> is a computer scientist and innovator specialising in Artificial Intelligence and Cognitive Computing. In addition to teaching at ESCP, he leads research investigating the cognitive collaboration between intelligent agents and humans at Brunel University. A Senior Member of the Association for Computing Machinery and research evaluator for the EU Research Programme, Gabriel is a co-founder and director of the London-based software company Reckon Digital, specialising in data science and process optimisation.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>How business leaders can bolster cybersecurity in the face of a cyber threat.<\/p>\n","protected":false},"author":1,"featured_media":6958,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14],"tags":[16,124,27],"class_list":["post-6957","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tomorrow-choices","tag-strategy","tag-supply-chain","tag-tech","category-14","description-off"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The delicate fabric of our IT ecosystem - The Choice by ESCP<\/title>\n<meta name=\"description\" content=\"How business leaders can bolster cybersecurity in the face of a cyber threat in the IT supply chain.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The delicate fabric of our IT ecosystem - The Choice by ESCP\" \/>\n<meta property=\"og:description\" content=\"How business leaders can bolster cybersecurity in the face of a cyber threat in the IT supply chain.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/\" \/>\n<meta property=\"og:site_name\" content=\"The Choice by ESCP\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESCPbs\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-16T11:02:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T10:35:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/shubham-dhage-rznchsifuq-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Choice Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ESCP_bs\" \/>\n<meta name=\"twitter:site\" content=\"@ESCP_bs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabio Natali &amp; Gabriel Scali\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/\"},\"author\":{\"name\":\"The Choice Team\",\"@id\":\"https:\/\/escp.eu\/thechoice\/#\/schema\/person\/d777675eb749ba0781e5ac5b056ea5c3\"},\"headline\":\"Supply-chain attacks and the delicate fabric of our IT ecosystem\",\"datePublished\":\"2022-03-16T11:02:18+00:00\",\"dateModified\":\"2024-10-17T10:35:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/\"},\"wordCount\":1530,\"publisher\":{\"@id\":\"https:\/\/escp.eu\/thechoice\/#organization\"},\"image\":{\"@id\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/shubham-dhage-rznchsifuq-unsplash.jpg\",\"keywords\":[\"#Strategy\",\"#SupplyChain\",\"#Tech\"],\"articleSection\":[\"Tomorrow's Choices, Today\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/\",\"url\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/\",\"name\":\"The delicate fabric of our IT ecosystem - The Choice by ESCP\",\"isPartOf\":{\"@id\":\"https:\/\/escp.eu\/thechoice\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/shubham-dhage-rznchsifuq-unsplash.jpg\",\"datePublished\":\"2022-03-16T11:02:18+00:00\",\"dateModified\":\"2024-10-17T10:35:29+00:00\",\"description\":\"How business leaders can bolster cybersecurity in the face of a cyber threat in the IT supply chain.\",\"breadcrumb\":{\"@id\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#primaryimage\",\"url\":\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/shubham-dhage-rznchsifuq-unsplash.jpg\",\"contentUrl\":\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/shubham-dhage-rznchsifuq-unsplash.jpg\",\"width\":1280,\"height\":853,\"caption\":\"3D Renders Featured on December 18, 2021, Blockchain, \u00a9 Shubham Dhage \/ Unsplash\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/escp.eu\/thechoice\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supply-chain attacks and the delicate fabric of our IT ecosystem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/escp.eu\/thechoice\/#website\",\"url\":\"https:\/\/escp.eu\/thechoice\/\",\"name\":\"The Choice by ESCP\",\"description\":\"The new media dedicated to choice makers\",\"publisher\":{\"@id\":\"https:\/\/escp.eu\/thechoice\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/escp.eu\/thechoice\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/escp.eu\/thechoice\/#organization\",\"name\":\"ESCP Business School\",\"url\":\"https:\/\/escp.eu\/thechoice\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/escp.eu\/thechoice\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/the-choice-main-image-logo.jpg\",\"contentUrl\":\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/the-choice-main-image-logo.jpg\",\"width\":1200,\"height\":800,\"caption\":\"ESCP Business School\"},\"image\":{\"@id\":\"https:\/\/escp.eu\/thechoice\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ESCPbs\/\",\"https:\/\/x.com\/ESCP_bs\",\"https:\/\/www.instagram.com\/escpbs\/\",\"https:\/\/www.linkedin.com\/school\/escp-business-school\/\",\"https:\/\/www.youtube.com\/c\/ESCPBusinessSchool\",\"https:\/\/fr.wikipedia.org\/wiki\/ESCP_Business_School\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/escp.eu\/thechoice\/#\/schema\/person\/d777675eb749ba0781e5ac5b056ea5c3\",\"name\":\"The Choice Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/escp.eu\/thechoice\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/the-choice_avatar.png\",\"contentUrl\":\"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/the-choice_avatar.png\",\"caption\":\"The Choice Team\"},\"sameAs\":[\"https:\/\/escp.eu\/thechoice\"],\"url\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The delicate fabric of our IT ecosystem - The Choice by ESCP","description":"How business leaders can bolster cybersecurity in the face of a cyber threat in the IT supply chain.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/","og_locale":"en_GB","og_type":"article","og_title":"The delicate fabric of our IT ecosystem - The Choice by ESCP","og_description":"How business leaders can bolster cybersecurity in the face of a cyber threat in the IT supply chain.","og_url":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/","og_site_name":"The Choice by ESCP","article_publisher":"https:\/\/www.facebook.com\/ESCPbs\/","article_published_time":"2022-03-16T11:02:18+00:00","article_modified_time":"2024-10-17T10:35:29+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/shubham-dhage-rznchsifuq-unsplash.jpg","type":"image\/jpeg"}],"author":"The Choice Team","twitter_card":"summary_large_image","twitter_creator":"@ESCP_bs","twitter_site":"@ESCP_bs","twitter_misc":{"Written by":"Fabio Natali &amp; Gabriel Scali","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#article","isPartOf":{"@id":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/"},"author":{"name":"The Choice Team","@id":"https:\/\/escp.eu\/thechoice\/#\/schema\/person\/d777675eb749ba0781e5ac5b056ea5c3"},"headline":"Supply-chain attacks and the delicate fabric of our IT ecosystem","datePublished":"2022-03-16T11:02:18+00:00","dateModified":"2024-10-17T10:35:29+00:00","mainEntityOfPage":{"@id":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/"},"wordCount":1530,"publisher":{"@id":"https:\/\/escp.eu\/thechoice\/#organization"},"image":{"@id":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/shubham-dhage-rznchsifuq-unsplash.jpg","keywords":["#Strategy","#SupplyChain","#Tech"],"articleSection":["Tomorrow's Choices, Today"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/","url":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/","name":"The delicate fabric of our IT ecosystem - The Choice by ESCP","isPartOf":{"@id":"https:\/\/escp.eu\/thechoice\/#website"},"primaryImageOfPage":{"@id":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#primaryimage"},"image":{"@id":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/shubham-dhage-rznchsifuq-unsplash.jpg","datePublished":"2022-03-16T11:02:18+00:00","dateModified":"2024-10-17T10:35:29+00:00","description":"How business leaders can bolster cybersecurity in the face of a cyber threat in the IT supply chain.","breadcrumb":{"@id":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#primaryimage","url":"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/shubham-dhage-rznchsifuq-unsplash.jpg","contentUrl":"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/shubham-dhage-rznchsifuq-unsplash.jpg","width":1280,"height":853,"caption":"3D Renders Featured on December 18, 2021, Blockchain, \u00a9 Shubham Dhage \/ Unsplash"},{"@type":"BreadcrumbList","@id":"https:\/\/escp.eu\/thechoice\/tomorrow-choices\/supply-chain-attacks-and-the-delicate-fabric-of-our-it-ecosystem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/escp.eu\/thechoice\/"},{"@type":"ListItem","position":2,"name":"Supply-chain attacks and the delicate fabric of our IT ecosystem"}]},{"@type":"WebSite","@id":"https:\/\/escp.eu\/thechoice\/#website","url":"https:\/\/escp.eu\/thechoice\/","name":"The Choice by ESCP","description":"The new media dedicated to choice makers","publisher":{"@id":"https:\/\/escp.eu\/thechoice\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/escp.eu\/thechoice\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/escp.eu\/thechoice\/#organization","name":"ESCP Business School","url":"https:\/\/escp.eu\/thechoice\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/escp.eu\/thechoice\/#\/schema\/logo\/image\/","url":"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/the-choice-main-image-logo.jpg","contentUrl":"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/the-choice-main-image-logo.jpg","width":1200,"height":800,"caption":"ESCP Business School"},"image":{"@id":"https:\/\/escp.eu\/thechoice\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ESCPbs\/","https:\/\/x.com\/ESCP_bs","https:\/\/www.instagram.com\/escpbs\/","https:\/\/www.linkedin.com\/school\/escp-business-school\/","https:\/\/www.youtube.com\/c\/ESCPBusinessSchool","https:\/\/fr.wikipedia.org\/wiki\/ESCP_Business_School"]},{"@type":"Person","@id":"https:\/\/escp.eu\/thechoice\/#\/schema\/person\/d777675eb749ba0781e5ac5b056ea5c3","name":"The Choice Team","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/escp.eu\/thechoice\/#\/schema\/person\/image\/","url":"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/the-choice_avatar.png","contentUrl":"https:\/\/escp.eu\/thechoice\/wp-content\/uploads\/the-choice_avatar.png","caption":"The Choice Team"},"sameAs":["https:\/\/escp.eu\/thechoice"],"url":""}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/posts\/6957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/comments?post=6957"}],"version-history":[{"count":8,"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/posts\/6957\/revisions"}],"predecessor-version":[{"id":6970,"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/posts\/6957\/revisions\/6970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/media\/6958"}],"wp:attachment":[{"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/media?parent=6957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/categories?post=6957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/escp.eu\/thechoice\/wp-json\/wp\/v2\/tags?post=6957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}