{"id":52596,"date":"2025-03-04T09:52:34","date_gmt":"2025-03-04T09:52:34","guid":{"rendered":"https:\/\/manufacturing-today.com\/?p=52596"},"modified":"2025-03-04T09:52:36","modified_gmt":"2025-03-04T09:52:36","slug":"navigating-cybersecurity-risks-in-the-manufacturing-supply-chain","status":"publish","type":"post","link":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/","title":{"rendered":"Navigating cybersecurity risks in the manufacturing supply chain"},"content":{"rendered":"<p><span data-contrast=\"auto\">The interconnected nature of global business is forcing manufacturers to adopt more robust frameworks to identify vulnerabilities and ensure the integrity of the components they rely on.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Easier said than done because manufacturing is anything but monolithic.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_52598\" aria-describedby=\"caption-attachment-52598\" style=\"width: 300px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-52598\" src=\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Ian-Bramson.png\" alt=\"Ian Bramson is Vice President of Global Industrial Cybersecurity at Black &amp; Veatch\" width=\"300\" height=\"425\" srcset=\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Ian-Bramson.png 300w, https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Ian-Bramson-212x300.png 212w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-52598\" class=\"wp-caption-text\">Ian Bramson, Vice President of Global Industrial Cybersecurity at Black &amp; Veatch<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">This is a complicated landscape featuring a sector spanning industries ranging from pharmaceuticals to chemical plants and automakers. Each has different levels of exposure and security priorities based on risk profiles, international operations and the type of goods produced.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">High-hazard industries, for example, often invest more in cybersecurity to prevent catastrophic events, while smaller manufacturers may struggle to allocate sufficient resources until they experience a breach firsthand.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Regardless of size or specialty, one thing remains constant: manufacturers must defend against both direct attacks on their supply chains and those that exploit their networks as a conduit. Achieving this requires visibility, control and thorough risk assessments.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Manufacturers occupy a critical position within supply chains and face risks from both upstream and downstream stages. They are vulnerable to direct attacks that could disrupt their operations and halt production, as well as to the risk of embedding cyber exploits in their products, either intentionally or unknowingly, enabling attacks to propagate further along the supply chain. Supply chain attacks typically fall into two main categories: those that target the supply chain itself and those that infiltrate systems through compromised components.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Attacks <\/span><i><span data-contrast=\"auto\">on<\/span><\/i><span data-contrast=\"auto\"> the supply chain target key suppliers or components to disrupt operations and delay the delivery of goods<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Attacks <\/span><i><span data-contrast=\"auto\">through<\/span><\/i><span data-contrast=\"auto\"> the supply chain occur when compromised components, such as an infected chip, make their way into a manufacturer\u2019s production line, embedding malware that can infect downstream systems or customers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In both scenarios, attackers exploit vulnerabilities in third-party vendors, creating ripple effects that can impact not just a single company but entire industries. So, how can manufacturing organizations build resilience against this expanding web of threats?<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Cyber acceptance testing<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">To strengthen their defenses, manufacturers must expand operational readiness to include security standards for products and services before deployment. While factory and site acceptance tests are standard, cybersecurity often receives less scrutiny.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cyber acceptance testing (CAT) bridges this gap by identifying known and unknown vulnerabilities in components before integration. This includes malware scans for familiar threats, anomaly detection to flag suspicious behaviors like unauthorized communications and system integration tests to uncover vulnerabilities that arise when components are combined. What\u2019s more, we need to protect what is known as well as what is unknown \u2013 and so for the latter, there are also ways to detect unknown exploits, such as with anomaly detection.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Without these proactive measures, manufacturers risk inheriting supplier vulnerabilities, leaving their operations exposed to significant threats.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Supply chain security<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Manufacturers should also adopt a security-by-design approach that anticipates potential threats and builds protective measures into systems from the start. By maintaining a \u2018clean build\u2019 approach, organizations can then monitor for vulnerabilities throughout the production process and establish clear protocols for detecting and responding to anomalies.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Yet, the need for supply chain resilience &#8211; the ability to pivot to alternative suppliers or components in the face of disruption &#8211; sometimes clashes with cybersecurity<img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-52599\" src=\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-body-image.jpg\" alt=\"An advanced industrial robot arm operates on a manufacturing line in a modern factory environment\" width=\"425\" height=\"300\" srcset=\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-body-image.jpg 425w, https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-body-image-300x212.jpg 300w\" sizes=\"auto, (max-width: 425px) 100vw, 425px\" \/> goals. While many companies enforce strict security protocols with their primary suppliers, these measures often fail to extend to secondary or backup vendors. You may have resilience in your supply chain, but if you haven\u2019t vetted your backup suppliers, you could be opening new vulnerabilities when switching sources.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To sidestep this risk, make sure that secondary and tertiary suppliers meet the same cybersecurity standards as their primary vendors. Also, embed cybersecurity requirements in supplier contracts and conduct regular audits to confirm compliance.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">At first blush that may sound like a lot. But by aligning resilience with strong cybersecurity measures, manufacturers can safeguard their operations without compromising their ability to adapt in times of disruption.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Cyber visibility<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Organizations must aim for comprehensive cyber visibility across their components and sub-components to identify potential vulnerabilities. Understanding the origin of these elements is essential, but equally important is assessing and prioritizing their risk levels to effectively manage and mitigate potential threats.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Manufacturers should map their entire supply chain to understand where components originate and conduct deeper assessments of their critical suppliers. All the while, manufacturers should strive to collaborate closely with their suppliers to ensure mutual understanding of cybersecurity protocols.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Part of that effort might also extend to the adoption of a standardized certification process that helps manufacturers consistently evaluate the security practices of their suppliers. Adopting frameworks such as NIST and IEC 62443 can prove effective when paired with proactive measures, such as anomaly detection and scenario planning with key suppliers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Preparing for an inevitable future<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The manufacturing sector faces significant pressure to modernize and secure its operations amid growing threats to its supply chains. However, with a proactive approach, manufacturers can transform cybersecurity from a regulatory obligation into a competitive advantage.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Achieving this requires a shift in mindset &#8211; where security becomes a fundamental component of both operational processes and strategic objectives. For forward-thinking manufacturers, this shift presents a valuable opportunity to stand out in an increasingly interconnected market.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">By positioning themselves as trusted partners who can withstand cyber disruptions without compromising output or quality, they\u2019ll be able to enhance their reputation and strengthen their market position at the same time.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Ian Bramson<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"http:\/\/www.bv.com\"><b><span data-contrast=\"auto\">www.bv.com<\/span><\/b><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\">Ian Bramson is Vice President of Global Industrial Cybersecurity at Black &amp; Veatch. Black &amp; Veatch\u202fis a 100-percent employee-owned global engineering, procurement, consulting and construction company with a more than 100-year track record of innovation in sustainable infrastructure. Since 1915, it has helped its clients improve the lives of people around the world by addressing the resilience and reliability of its most important infrastructure assets.<\/span><\/i><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The interconnected nature of global business is forcing manufacturers to adopt more robust frameworks to identify vulnerabilities and ensure the<\/p>\n","protected":false},"author":6,"featured_media":52597,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[685,2],"tags":[139,693,3321,3322,3323],"class_list":["post-52596","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","category-features","tag-security","tag-cybersecurity","tag-3321","tag-ian-bramson","tag-black-veatch"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Navigating cybersecurity risks in the manufacturing supply chain<\/title>\n<meta name=\"description\" content=\"The interconnected nature of global business is forcing manufacturers to adopt more robust frameworks to identify vulnerabilities and....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating cybersecurity risks in the manufacturing supply chain\" \/>\n<meta property=\"og:description\" content=\"The interconnected nature of global business is forcing manufacturers to adopt more robust frameworks to identify vulnerabilities and....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"Manufacturing Today\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-04T09:52:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T09:52:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-headline-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Iain\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Iain\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/\"},\"author\":{\"name\":\"Iain\",\"@id\":\"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632\"},\"headline\":\"Navigating cybersecurity risks in the manufacturing supply chain\",\"datePublished\":\"2025-03-04T09:52:34+00:00\",\"dateModified\":\"2025-03-04T09:52:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/\"},\"wordCount\":974,\"image\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-headline-image.jpg\",\"keywords\":[\"Security\",\"Cybersecurity\",\"233\",\"Ian Bramson\",\"Black &amp; Veatch.\"],\"articleSection\":[\"Technology\",\"Features\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/\",\"url\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/\",\"name\":\"Navigating cybersecurity risks in the manufacturing supply chain\",\"isPartOf\":{\"@id\":\"https:\/\/manufacturing-today.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-headline-image.jpg\",\"datePublished\":\"2025-03-04T09:52:34+00:00\",\"dateModified\":\"2025-03-04T09:52:36+00:00\",\"author\":{\"@id\":\"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632\"},\"description\":\"The interconnected nature of global business is forcing manufacturers to adopt more robust frameworks to identify vulnerabilities and....\",\"breadcrumb\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#primaryimage\",\"url\":\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-headline-image.jpg\",\"contentUrl\":\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-headline-image.jpg\",\"width\":750,\"height\":400,\"caption\":\"Car Factory 3D Concept: Automated Robot Arm Assembly Line Manufacturing High-Tech Green Energy Electric Vehicles. Construction, Building, Welding Industrial Production Conveyor. Elevated Wide Shot\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/manufacturing-today.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating cybersecurity risks in the manufacturing supply chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/manufacturing-today.com\/#website\",\"url\":\"https:\/\/manufacturing-today.com\/\",\"name\":\"Manufacturing Today\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/manufacturing-today.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632\",\"name\":\"Iain\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/manufacturing-today.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4ddfd6f521e90a9e910545b62122a2e535cd13ea6e7c6e0edaf2080a3ee77b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4ddfd6f521e90a9e910545b62122a2e535cd13ea6e7c6e0edaf2080a3ee77b6?s=96&d=mm&r=g\",\"caption\":\"Iain\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigating cybersecurity risks in the manufacturing supply chain","description":"The interconnected nature of global business is forcing manufacturers to adopt more robust frameworks to identify vulnerabilities and....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/","og_locale":"en_GB","og_type":"article","og_title":"Navigating cybersecurity risks in the manufacturing supply chain","og_description":"The interconnected nature of global business is forcing manufacturers to adopt more robust frameworks to identify vulnerabilities and....","og_url":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/","og_site_name":"Manufacturing Today","article_published_time":"2025-03-04T09:52:34+00:00","article_modified_time":"2025-03-04T09:52:36+00:00","og_image":[{"width":750,"height":400,"url":"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-headline-image.jpg","type":"image\/jpeg"}],"author":"Iain","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Iain","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#article","isPartOf":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/"},"author":{"name":"Iain","@id":"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632"},"headline":"Navigating cybersecurity risks in the manufacturing supply chain","datePublished":"2025-03-04T09:52:34+00:00","dateModified":"2025-03-04T09:52:36+00:00","mainEntityOfPage":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/"},"wordCount":974,"image":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-headline-image.jpg","keywords":["Security","Cybersecurity","233","Ian Bramson","Black &amp; Veatch."],"articleSection":["Technology","Features"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/","url":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/","name":"Navigating cybersecurity risks in the manufacturing supply chain","isPartOf":{"@id":"https:\/\/manufacturing-today.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#primaryimage"},"image":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-headline-image.jpg","datePublished":"2025-03-04T09:52:34+00:00","dateModified":"2025-03-04T09:52:36+00:00","author":{"@id":"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632"},"description":"The interconnected nature of global business is forcing manufacturers to adopt more robust frameworks to identify vulnerabilities and....","breadcrumb":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#primaryimage","url":"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-headline-image.jpg","contentUrl":"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/03\/Cybersecurity-233-headline-image.jpg","width":750,"height":400,"caption":"Car Factory 3D Concept: Automated Robot Arm Assembly Line Manufacturing High-Tech Green Energy Electric Vehicles. Construction, Building, Welding Industrial Production Conveyor. Elevated Wide Shot"},{"@type":"BreadcrumbList","@id":"https:\/\/manufacturing-today.com\/news\/navigating-cybersecurity-risks-in-the-manufacturing-supply-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/manufacturing-today.com\/"},{"@type":"ListItem","position":2,"name":"Navigating cybersecurity risks in the manufacturing supply chain"}]},{"@type":"WebSite","@id":"https:\/\/manufacturing-today.com\/#website","url":"https:\/\/manufacturing-today.com\/","name":"Manufacturing Today","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/manufacturing-today.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632","name":"Iain","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/manufacturing-today.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4ddfd6f521e90a9e910545b62122a2e535cd13ea6e7c6e0edaf2080a3ee77b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4ddfd6f521e90a9e910545b62122a2e535cd13ea6e7c6e0edaf2080a3ee77b6?s=96&d=mm&r=g","caption":"Iain"}}]}},"_links":{"self":[{"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/posts\/52596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/comments?post=52596"}],"version-history":[{"count":1,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/posts\/52596\/revisions"}],"predecessor-version":[{"id":52600,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/posts\/52596\/revisions\/52600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/media\/52597"}],"wp:attachment":[{"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/media?parent=52596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/categories?post=52596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/tags?post=52596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}