{"id":4580,"date":"2024-03-12T14:13:26","date_gmt":"2024-03-12T14:13:26","guid":{"rendered":"https:\/\/rimian.io\/march-2024-rimian-introduces-integrated-cyber-risk-management-for-supply-chain-security-assessment"},"modified":"2025-02-03T10:26:08","modified_gmt":"2025-02-03T10:26:08","slug":"march-2024-rimian-introduces-integrated-cyber-risk-management-for-supply-chain-security-assessment","status":"publish","type":"post","link":"https:\/\/rimian.io\/en\/march-2024-rimian-introduces-integrated-cyber-risk-management-for-supply-chain-security-assessment","title":{"rendered":"March 2024: RIMIAN introduces integrated cyber risk management for supply chain security assessment!"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4580\" class=\"elementor elementor-4580 elementor-2027\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7928b4a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7928b4a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6166e70\" data-id=\"6166e70\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f953336 elementor-widget elementor-widget-heading\" data-id=\"f953336\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">March 2024: RIMIAN introduces integrated cyber risk management for supply chain security assessment!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91d265c elementor-widget elementor-widget-image\" data-id=\"91d265c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"576\" src=\"https:\/\/rimian.io\/wp-content\/uploads\/2024\/03\/Cybersicherheit-Lieferkette-768x576.png\" class=\"attachment-medium_large size-medium_large wp-image-3919\" alt=\"\" srcset=\"https:\/\/rimian.io\/wp-content\/uploads\/2024\/03\/Cybersicherheit-Lieferkette-768x576.png 768w, https:\/\/rimian.io\/wp-content\/uploads\/2024\/03\/Cybersicherheit-Lieferkette-300x225.png 300w, https:\/\/rimian.io\/wp-content\/uploads\/2024\/03\/Cybersicherheit-Lieferkette.png 1024w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01418f6 elementor-widget elementor-widget-text-editor\" data-id=\"01418f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Eingabe hier...\">Integrated cyber risk management to assess supply chain security<\/h2>\n<\/p>\n<p>In the current implementation of the NIS2 regulation, the assessment of supply chain security plays a crucial role. It is of fundamental importance to assess the impact of potential cyber risks on the ability to deliver goods and services. This analysis is extremely complex and requires thorough investigation.  <\/p>\n<p>LIFEBLood offers an automated approach that makes it possible to map technical and organizational cyber risks at the level of products or services. With this approach, companies can gain a comprehensive insight into potential risks and take appropriate measures to secure their supply chains. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>March 2024: RIMIAN introduces integrated cyber risk management for supply chain security assessment! Integrated cyber risk management to assess supply chain security In the current implementation of the NIS2 regulation, the assessment of supply chain security plays a crucial role. It is of fundamental importance to assess the impact of potential cyber risks on the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[26],"tags":[],"class_list":["post-4580","post","type-post","status-publish","format-standard","hentry","category-posts-rimian"],"_links":{"self":[{"href":"https:\/\/rimian.io\/en\/wp-json\/wp\/v2\/posts\/4580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rimian.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rimian.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rimian.io\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rimian.io\/en\/wp-json\/wp\/v2\/comments?post=4580"}],"version-history":[{"count":1,"href":"https:\/\/rimian.io\/en\/wp-json\/wp\/v2\/posts\/4580\/revisions"}],"predecessor-version":[{"id":4581,"href":"https:\/\/rimian.io\/en\/wp-json\/wp\/v2\/posts\/4580\/revisions\/4581"}],"wp:attachment":[{"href":"https:\/\/rimian.io\/en\/wp-json\/wp\/v2\/media?parent=4580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rimian.io\/en\/wp-json\/wp\/v2\/categories?post=4580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rimian.io\/en\/wp-json\/wp\/v2\/tags?post=4580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}