{"id":28832,"date":"2026-01-15T15:08:38","date_gmt":"2026-01-15T14:08:38","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=28832"},"modified":"2026-01-15T15:08:40","modified_gmt":"2026-01-15T14:08:40","slug":"tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/","title":{"rendered":"TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain"},"content":{"rendered":"\n<p><span data-contrast=\"auto\">In a highly interconnected industrial environment, operational performance relies on an\u00a0<\/span><b><span data-contrast=\"auto\">extended ecosystem of partners<\/span><\/b><span data-contrast=\"auto\">: critical suppliers, system integrators, maintenance providers, software vendors, IT and OT service providers, and others. While this ecosystem is essential to the company\u2019s operations, it also\u00a0represents\u00a0one of the\u00a0<\/span><b><span data-contrast=\"auto\">primary vectors of cyber risk<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cyberattacks no longer target only internal information systems. They increasingly exploit external dependencies, where governance, visibility, and control are often weaker. A vulnerability affecting a\u00a0third party\u00a0can now lead to direct impacts on production, personnel safety, regulatory compliance, or the organization\u2019s reputation.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The attack suffered by Jaguar Land Rover in 2025 illustrates this reality: the shutdown of systems paralyzed the production chain and its partners, preventing the manufacture of more than 25,000 vehicles and resulting in estimated losses of\u00a0nearly one\u00a0billion pounds.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Managing\u00a0third-party\u00a0cyber risks<\/span><\/b><span data-contrast=\"auto\">\u00a0is therefore no longer a peripheral issue. It is\u00a0a central component\u00a0of any industrial cybersecurity strategy, commonly referred to as\u00a0<\/span><b><span data-contrast=\"auto\">TPRM<\/span><\/b><span data-contrast=\"auto\">\u00a0(Third-Party Risk Management) or\u00a0<\/span><b><span data-contrast=\"auto\">TPCRM<\/span><\/b><span data-contrast=\"auto\">\u00a0(Third-party\u00a0Cyber Risk Management). These\u00a0concepts\u00a0cover the overall management of third-party risks and\u00a0its\u00a0specific application to cyber risks.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>Third parties driving the industrial value chain\u00a0<\/h1>\n<p><span data-contrast=\"auto\">The concept of a \u201cthird-party\u201d refers to any external entity or individual that collaborates with an organization and interacts with its systems, data, or processes. These actors contribute directly or indirectly to the company\u2019s activities and collectively form what is known as the supply chain.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In industrial environments,\u00a0third parties\u00a0can\u00a0generally be\u00a0grouped into five major categories, reflecting the diversity of roles they play in the operation and maintenance of industrial systems:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-28833 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en1-1.png\" alt=\"\" width=\"806\" height=\"563\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en1-1.png 1087w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en1-1-273x191.png 273w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en1-1-56x39.png 56w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en1-1-768x537.png 768w\" sizes=\"auto, (max-width: 806px) 100vw, 806px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Mapping\u00a0third parties\u00a0across the supply chain<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To ensure seamless operational continuity, industrial organizations rely heavily on external service providers. This dependency,\u00a0driven by the outsourcing of critical activities and regulatory requirements,\u00a0<\/span><b><span data-contrast=\"auto\">turns each supplier into an essential link<\/span><\/b><span data-contrast=\"auto\">\u00a0in the chain. A single compromise affecting a\u00a0third-party\u00a0can be enough to halt production, disrupt operations, and expose the organization to major risks.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>An\u00a0extended\u00a0supply\u00a0chain:\u00a0difficult to\u00a0manage and\u00a0vulnerable\u00a0<\/h1>\n<p><span data-contrast=\"auto\">The diversity and number of\u00a0third parties\u00a0present several major challenges for organizations. First, the third-party ecosystem is often\u00a0<\/span><b><span data-contrast=\"auto\">extremely large<\/span><\/b><span data-contrast=\"auto\">: a single organization may rely on hundreds or even thousands of partners.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This scale is compounded by\u00a0<\/span><b><span data-contrast=\"auto\">significant complexity<\/span><\/b><span data-contrast=\"auto\">, as the supply chain does not stop with direct\u00a0third parties,\u00a0but also includes their own service providers, which are essential to their business continuity. As one moves down these successive levels (fourth parties,\u00a0n-parties\u00a0and\u00a0beyond), the client organization\u2019s visibility into its\u00a0third parties\u00a0decreases sharply:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-28818 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en2.png\" alt=\"\" width=\"773\" height=\"527\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en2.png 1023w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en2-280x191.png 280w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en2-57x39.png 57w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en2-768x523.png 768w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/span><i><span data-contrast=\"none\">An illustration of\u00a0supply\u00a0chain\u00a0complexity\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This combination of breadth and depth makes it particularly difficult to\u00a0maintain\u00a0<\/span><b><span data-contrast=\"auto\">overall control of the ecosystem<\/span><\/b><span data-contrast=\"auto\">. For example, it is estimated that only 3% of organizations have full visibility across their entire supply chain (Panorays, 2025). This lack of visibility creates a\u00a0<\/span><b><span data-contrast=\"auto\">broad and difficult-to-manage risk surface<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>Third party risks: a growing threat under regulatory pressure\u00a0<\/h1>\n<p><span data-contrast=\"auto\">In recent years, there has been a significant increase in cyberattacks involving\u00a0third parties. This trend is particularly pronounced in industrial environments, where\u00a0<\/span><b><span data-contrast=\"auto\">third parties\u00a0are often involved in critical and vulnerable processes<\/span><\/b><span data-contrast=\"auto\">: remote access to systems, physical\u00a0access\u00a0on site, identity and access management, and the integration of software or hardware components.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-28816 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en3.png\" alt=\"\" width=\"777\" height=\"385\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en3.png 1386w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en3-385x191.png 385w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en3-71x35.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/tpcrm_en3-768x381.png 768w\" sizes=\"auto, (max-width: 777px) 100vw, 777px\" \/><\/span><span data-contrast=\"auto\">These figures highlight two key observations. First,\u00a0third-party\u00a0risks are very real and represent a\u00a0<\/span><b><span data-contrast=\"auto\">growing threat<\/span><\/b><span data-contrast=\"auto\">\u00a0to the cybersecurity ecosystem. Second,\u00a0<\/span><b><span data-contrast=\"auto\">the maturity level of organizations\u00a0remains\u00a0globally insufficient<\/span><\/b><span data-contrast=\"auto\">, even as TPCRM\u00a0emerges\u00a0as a strategic lever for risk reduction.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These findings are now reflected in regulatory frameworks. The European NIS 2 Directive, currently being transposed into national laws across EU Member States, requires affected organizations to manage risks related to their supply chains. Managing cyber risks linked to\u00a0third parties\u00a0is thus becoming a full-fledged regulatory requirement, with potential penalties of up to \u20ac10 million or 2% of global annual turnover\u00a0in the event of\u00a0non-compliance.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>Adapting third party risk management to\u00a0 industrial needs\u00a0<\/h1>\n<p><span data-contrast=\"auto\">In light of\u00a0these challenges, how can organizations structure effective\u00a0third-party\u00a0cyber risk management? While approaches vary, several key principles consistently\u00a0emerge:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Cross-functional stakeholder involvement<\/span><\/b><span data-contrast=\"auto\">:\u00a0Third-party\u00a0risk management cannot be the sole responsibility of IT or cybersecurity teams. Procurement, operational teams, and business units must be fully involved, as\u00a0third parties\u00a0operate\u00a0across all levels of the organization.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Lifecycle-based approach<\/span><\/b><span data-contrast=\"auto\">: Risk must be considered from supplier\u00a0selection\u00a0through to the end of the commercial relationship. Each phase\u00a0(contracting, onboarding, operations, and offboarding)\u00a0should be governed by\u00a0appropriate security\u00a0requirements.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Clear contractual requirements<\/span><\/b><span data-contrast=\"auto\">: Contracts should formally define and include explicit cybersecurity obligations to ensure a consistent level of protection throughout the collaboration.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Third-party\u00a0prioritization<\/span><\/b><span data-contrast=\"auto\">: Security efforts must be proportional to the criticality of partners (e.g., level of system integration, operational dependency, sensitivity of\u00a0exchanged data, relationship history). Assessing their operational role and cyber maturity helps focus resources on the most critical\u00a0third parties.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Collaboration and information sharing<\/span><\/b><span data-contrast=\"auto\">: Supply chain resilience depends on the ability of stakeholders to share information and coordinate responses\u00a0in the event of\u00a0an incident.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Tooling and automation<\/span><\/b><span data-contrast=\"auto\">: Given the volume of\u00a0third-parties, automation, continuous assessment, and the use of specialized tools are becoming essential enablers.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">To support organizations in this approach, several authoritative references exist, including NIST SP 800-161 Rev. 1\u00a0<\/span><i><span data-contrast=\"auto\">\u201cCybersecurity Supply Chain Risk Management Practices for Systems and Organizations\u201d<\/span><\/i><span data-contrast=\"auto\">\u00a0(2022) and ENISA\u2019s\u00a0<\/span><i><span data-contrast=\"auto\">\u201cGood Practices for Supply Chain Cybersecurity\u201d<\/span><\/i><span data-contrast=\"auto\">\u00a0(2023).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>TPCRM:\u00a0strengthening\u00a0industrial\u00a0resilience\u00a0<\/h1>\n<p><span data-contrast=\"auto\">In an industrial context where\u00a0<\/span><b><span data-contrast=\"auto\">cyber risks are becoming systemic<\/span><\/b><span data-contrast=\"auto\">, supply chain security can no longer be addressed through a purely technical lens. It is now a\u00a0<\/span><b><span data-contrast=\"auto\">strategic issue of governance and resilience<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A mature TPCRM approach not only supports\u00a0<\/span><b><span data-contrast=\"auto\">regulatory compliance<\/span><\/b><span data-contrast=\"auto\">\u00a0but, more importantly, enables organizations to better\u00a0<\/span><b><span data-contrast=\"auto\">anticipate\u00a0crisis scenarios<\/span><\/b><span data-contrast=\"auto\">, limit operational impacts, and\u00a0<\/span><b><span data-contrast=\"auto\">strengthen trust across their partner ecosystem<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">By combining governance, processes, technologies, and collaboration with the wider ecosystem, TPCRM establishes itself as a key strategic lever for sustainably securing industrial environments<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a highly interconnected industrial environment, operational performance relies on an\u00a0extended ecosystem of partners: critical suppliers, system integrators, maintenance providers, software vendors, IT and OT service providers, and others. While this ecosystem is essential to the company\u2019s operations, it also\u00a0represents\u00a0one&#8230;<\/p>\n","protected":false},"author":1499,"featured_media":28837,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3977,3274],"tags":[],"coauthors":[4895,4896],"class_list":["post-28832","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-focus","category-manufacturing-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"In a highly interconnected industrial environment, operational performance relies on an\u00a0extended ecosystem of partners: critical suppliers, system integrators, maintenance providers, software vendors, IT and OT service providers, and others. While this ecosystem is essential to the company\u2019s operations, it also\u00a0represents\u00a0one...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-15T14:08:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T14:08:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/jacques-dillies-jcav1COVvOc-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"891\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Margot MARQUET, Nicolas BLOCH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Margot MARQUET, Nicolas BLOCH\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/\"},\"author\":{\"name\":\"Madeline Salles\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8\"},\"headline\":\"TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain\",\"datePublished\":\"2026-01-15T14:08:38+00:00\",\"dateModified\":\"2026-01-15T14:08:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/\"},\"wordCount\":986,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/jacques-dillies-jcav1COVvOc-unsplash-scaled.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Focus\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/\",\"name\":\"TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/jacques-dillies-jcav1COVvOc-unsplash-scaled.jpg\",\"datePublished\":\"2026-01-15T14:08:38+00:00\",\"dateModified\":\"2026-01-15T14:08:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/jacques-dillies-jcav1COVvOc-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/jacques-dillies-jcav1COVvOc-unsplash-scaled.jpg\",\"width\":2560,\"height\":891},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8\",\"name\":\"Madeline Salles\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/madeline-salles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/","og_locale":"en_US","og_type":"article","og_title":"TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain - RiskInsight","og_description":"In a highly interconnected industrial environment, operational performance relies on an\u00a0extended ecosystem of partners: critical suppliers, system integrators, maintenance providers, software vendors, IT and OT service providers, and others. While this ecosystem is essential to the company\u2019s operations, it also\u00a0represents\u00a0one...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/","og_site_name":"RiskInsight","article_published_time":"2026-01-15T14:08:38+00:00","article_modified_time":"2026-01-15T14:08:40+00:00","og_image":[{"width":2560,"height":891,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/jacques-dillies-jcav1COVvOc-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Margot MARQUET, Nicolas BLOCH","twitter_misc":{"Written by":"Margot MARQUET, Nicolas BLOCH","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/"},"author":{"name":"Madeline Salles","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8"},"headline":"TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain","datePublished":"2026-01-15T14:08:38+00:00","dateModified":"2026-01-15T14:08:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/"},"wordCount":986,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/jacques-dillies-jcav1COVvOc-unsplash-scaled.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Focus","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/","name":"TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/jacques-dillies-jcav1COVvOc-unsplash-scaled.jpg","datePublished":"2026-01-15T14:08:38+00:00","dateModified":"2026-01-15T14:08:40+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/jacques-dillies-jcav1COVvOc-unsplash-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/01\/jacques-dillies-jcav1COVvOc-unsplash-scaled.jpg","width":2560,"height":891},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/01\/tpcrm-for-ot-managing-cyber-risks-across-the-supply-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"TPCRM\u00a0for\u00a0OT:\u00a0managing cyber risks across the supply chain"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8","name":"Madeline Salles","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/madeline-salles\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/28832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1499"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=28832"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/28832\/revisions"}],"predecessor-version":[{"id":28836,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/28832\/revisions\/28836"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/28837"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=28832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=28832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=28832"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=28832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}