According to industrialcyber.co, supply chain risk has moved to the center of cyber sovereignty discussions—especially for critical infrastructure operators—as hidden dependencies and long-tail vendors come under intensified scrutiny. The shift reflects growing recognition that every third-party vendor relationship is a potential access point for adversaries, who have demonstrated capacity to move silently through supply chains for months before launching attacks.
Cyber Sovereignty Redefines Industrial Procurement
Cyber sovereignty in industrial contexts is defined not as a political abstraction but as an operational imperative: an organization’s ability to operate, control and defend its systems without depending on technology that answers to someone else’s government, according to Marco Ayala, technical director for global energy cybersecurity at ABS Consulting. He noted that procurement decisions in energy, maritime, and chemicals sectors—once driven by cost, compatibility, and vendor relationships—are now embedding geopolitical exposure criteria directly into vendor qualification processes and technology procurement standards.
Trust-Driven Sourcing Replaces Cost-Driven Sourcing
Joseph M. Saunders, founder and CEO of RunSafe Security, emphasized that cyber sovereignty comes down to control and assurance:
“Organizations need to know what software they are running on their devices, where it comes from, and whether it can be trusted under pressure.” — Joseph M. Saunders, founder and CEO of RunSafe Security
He stressed a necessary shift from cost-driven to trust-driven sourcing, urging organizations to ask harder questions about software provenance—because without verifiable software supply chains, risk cannot be controlled.
Long-Term Jurisdictional Exposure Demands Quantification
Susan Peterson Sturm, senior director for security products and partner strategy at Wabtec Corp., highlighted the lifecycle implications of sourcing decisions in rail:
“In rail, a sourcing decision locks you into a 25–40 year dependency… If that supplier’s government can compel access, withhold updates, or restrict exports, you have material exposure embedded in your product for its entire lifecycle.” — Susan Peterson Sturm, senior director for security products and partner strategy at Wabtec Corp.
She pointed to Value at Risk (VaR) and the FAIR model as emerging frameworks for expressing jurisdictional exposure in financial terms—especially after SEC disclosure rules (8-K and 10-K) tied cybersecurity misrepresentation to securities fraud consequences.
Data Sovereignty Evolves Into Firmware and Device Sovereignty
Joshua Marpet, senior product security consultant at Finite State, observed that the governance conversation has shifted from data sovereignty to deeper questions:
“Who owns your firmware? Your devices? The NAND chips inside them? Do you actually know where it came from?” — Joshua Marpet, senior product security consultant at Finite State
He noted that while globalized supply chains once enabled cross-border technology adoption—even among geopolitical rivals—today’s borders are firming up amid rising tensions.
Industry Signals and Investment Trends
Real progress is underway. Deloitte data shows organizations investing more heavily in securing converged IT and OT environments, recognizing that supply chain exposure can directly derail operational continuity. Similarly, IDC insights indicate climbing spending on supply chain risk management technologies as firms seek deeper visibility into vendor ecosystems they once took for granted. Yet compliance alone falls short: research flagged by the World Economic Forum found that more than half of large organizations see supply chain complexity as a core barrier to cyber resilience.
- The problem is no longer just identifying risk—but verifying trust across layers of suppliers, many operating in geopolitically sensitive regions where loyalties and regulations don’t align with operational expectations
- Vendor risk is increasingly viewed through a national security lens, especially across critical environments
- Concentration risk—once a procurement headache—now carries geopolitical weight
- Boardrooms are shifting from periodic audits to demanding continuous assurance
Source: industrialcyber.co
Compiled from international media by the SCI.AI editorial team.










