Our Leadership and Advisory Minds
Our Leadership and Advisory Minds
Our Leadership
Supply Assure is led by three equal Co-founders who bring together 80 years of combined expertise in safeguarding critical supply chains across defence, infrastructure, and commercial sectors. Their collective experience encompasses securing Britain’s most sensitive networks, from defence systems across EMEA to nuclear programmes, Critical National Infrastructure projects, and parliamentary restoration initiatives. This leadership team combines deep operational security knowledge with commercial supply chain governance, having delivered strategic oversight for organisations including Transport for London, Crossrail, the NHS, major financial institutions, and UK Government departments.
The Co-founders hold prestigious industry certifications including Chartered Engineer status, CISSP, Certified Information Security Manager, and ISO 27001 Lead Auditor credentials, with active HMG Security Clearance and ongoing study in emerging AI security disciplines at Oxford. Their expertise spans third-party risk management, supply chain assurance framework development, post-contract audit delivery across NEC and G-Cloud frameworks, and service as former CESG Listed Specialist Advisors, positioning Supply Assure with unparalleled insight into both public and private sector supply chain security challenges.
Our Advisory Group
Supply Assure’s Advisory Board comprises eight distinguished leaders, each bringing successful track records from senior positions across both private and public sectors. These accomplished professionals span every critical business discipline, from cybersecurity and risk management to commercial governance and infrastructure delivery.
Our advisors provide invaluable strategic guidance, challenging our thinking and strengthening our ability to deliver comprehensive security solutions. Their diverse perspectives and extensive experience ensure Supply Assure remains at the forefront of supply chain security innovation, whilst maintaining practical relevance to the real-world challenges facing our clients’ critical operations.
Take the first step toward supply chain confidence—connect with our experts who can help protect your critical assets and reputation.
Supply Chain Security Our Way
Supply Assure Q&A
What is Supply Chain Security Assurance?
The integrity of organisational security now extends far beyond traditional boundaries, making supply chain security a fundamental cornerstone of modern risk management. Each connection point in your supply chain represents not just a business relationship, but a critical security junction requiring rigorous assurance measures to protect your organisation’s data, systems, and reputation.
Today’s business landscape demands an unprecedented level of interconnectivity, with organisations relying on an extensive network of suppliers for everything from cloud services to hardware components and staffing solutions. This intricate web extends further as each supplier maintains their own complex network of sub-suppliers, creating multiple tiers of relationships that require comprehensive security validation and continuous assurance monitoring.
While strategic partnerships fuel innovation and drive operational excellence by providing access to specialised capabilities, they also introduce complex security interdependencies. This necessitates a transformation in how organisations approach security assurance – moving from periodic assessments to continuous monitoring and validation of security controls across the entire supplier ecosystem.
The challenge of maintaining effective security oversight across these sophisticated, globally distributed supply chains cannot be overstated. According to Accenture’s State of Cyber Security Resilience report, 40% of security breaches are now originating through the supply chain, with each third-party relationship representing a potential vulnerability that requires robust assurance measures. Gartner’s research presents an even more concerning figure, predicting that by 2025, 45% of organisations worldwide will have experienced attacks on their software supply chains. The traditional approach of implicit trust in vendor relationships has become obsolete, requiring instead a comprehensive security assurance framework that validates and verifies security controls at every level.
Organisations must now elevate their supply chain security assurance programs to unprecedented levels, implementing rigorous validation processes, continuous monitoring systems, and comprehensive security controls that span their entire supplier ecosystem. This includes:
- Regular security assessments and attestations
- Continuous monitoring of supplier security postures
- Clear security requirements in supplier contracts
- Verified incident response capabilities
- Documented security control validation processes
The imperative for robust supply chain security assurance has never been more critical. As supply chain attacks grow in sophistication and frequency, organisations must move beyond basic vendor assessments to implement comprehensive assurance programs that provide real-time visibility and control across their entire supply chain ecosystem. The cost of inadequate assurance measures extends beyond immediate financial impact to long-term reputational damage and loss of customer trust.
Mind the Gap! What is Lacking - Supply Chain Security Remains a Critical Vulnerability?
The landscape of supply chain security in the UK remains fragmented and inconsistent, despite increasing cyber threats. The National Cyber Security Centre (NCSC) has taken a firm stance on this issue, emphasising in their Supply Chain Security Guidance that organisations must “gain assurance in proportion to the risk” of their supplier relationships. The NCSC specifically warns that supply chain compromises can be devastating, as demonstrated by several high-profile incidents that have affected thousands of organisations simultaneously.
The NCSC’s guidance outlines four key principles that highlight current security gaps:
- Understanding supplier relationships and their associated risks
- Setting and communicating minimum security requirements to suppliers
- Implementing continuous supplier assurance monitoring
- Planning for security incidents and maintaining response plans
According to the UK Government’s 2023 Cyber Security Breaches Survey, conducted by Ipsos MORI, organisations face three fundamental barriers to effective supply chain security: – Limited understanding of complex supplier networks and their associated cyber risks – Poor visibility across multi-tier supply chains, particularly in critical sectors – Insufficient tools and frameworks for conducting thorough supplier security assessments A particularly worrying trend is the persistence of ‘security by assumption’ – a practice the NCSC explicitly warns against. They advocate instead for a principle of “assume breach,” where organisations should operate under the assumption that their supply chain could be compromised at any time. This aligns with modern security principles endorsed by both the NCSC and the UK Government’s Minimum Cyber Security Standard, advocating for a zero-trust architecture where all users, devices, and suppliers require continuous validation.
The NCSC’s Supply Chain Security Guidance specifically recommends that organisations:
- Map their supplier landscape and understand data flows
- Establish clear ownership of supplier relationships
- Implement proportionate security controls based on supplier criticality
- Regularly test incident response plans that include supplier scenarios
- Maintain clear security requirements in supplier contracts
While the UK’s National Security and Investment Act has strengthened some aspects of supply chain oversight, organisations cannot rely solely on regulatory frameworks. Every supplier connection represents a potential vulnerability, and threat actors are increasingly targeting these relationships through sophisticated “island hopping” campaigns. This risk is so significant that both ISO 27001 and the UK Government’s Cyber Assessment Framework emphasise the critical importance of robust supplier security management.
Moving forward requires a fundamental shift from trust-based to evidence-based security assurance. Organisations must implement comprehensive supplier assessment programs that align with the NCSC’s guidance and upcoming UK cyber resilience regulations. The NCSC emphasises that this isn’t just about security – it’s about business resilience and maintaining the trust of customers and partners. Without this transformation, supply chain vulnerabilities will continue to be the weak link in organisational security.
Should an organisation take a one-size-fits-all approach to setting the security requirements of their supply chain?
Taking a one-size-fits-all approach to setting security requirements for a supply chain is generally not advisable. Each organisation within a supply chain faces unique risks and has specific security needs. A standardised approach may overlook these particular vulnerabilities and fail to address the distinct threats faced by different entities.
Tailoring security measures to fit the unique characteristics of each organisation (or Head Contract) ensures that all potential risks are adequately managed. Customised security plans can adapt to the varying levels of risk and compliance requirements across the supply chain, providing a more robust defence against potential threats.
A generic security plan might not cover all the specific risks and security gaps present in each organisation, leading to a higher chance of data breaches or cyber-attacks. Additionally, different regions and industries have varying regulatory requirements. A one-size-fits-all approach may not meet all these diverse compliance standards, potentially resulting in legal and financial repercussions.
Cyber threats are constantly evolving, and a static, one-size-fits-all security plan may not be able to keep up with new and emerging threats. Continuous monitoring and updating of security measures are essential to stay ahead of cyber criminals. Therefore, organisations should focus on developing flexible, customised security strategies that address the specific needs and risks of each part of their supply chain.
What is Digital Assurance and Why Does it Matter?
Digital assurance is crucial when setting security requirements across your supply chain digital infrastructure (inclusive of software and platforms) use for several reasons. Firstly, it helps identify and mitigate risks associated with the digital components of the supply chain. By ensuring that all digital infrastructure meets stringent security standards, organisations can prevent unauthorised access, data breaches, and other cyber threats.
Compliance with regulatory requirements is another key reason for the importance of digital assurance. Many industries have specific regulations for data protection and cyber security. Digital assurance ensures compliance with these regulations, helping organisations avoid potential legal and financial penalties.
Operational continuity is another critical aspect. Ensuring the security of digital tools and platforms helps maintain smooth operations. Cyber-attacks can disrupt supply chain activities, leading to delays, financial losses, and damage to reputation. Digital assurance minimises these risks by ensuring robust security measures are in place.
Implementing a digital assurance plan also builds trust and transparency with partners and customers. Demonstrating a commitment to security and transparency is particularly important in supply chains where sensitive data and critical operations are involved. This trust can enhance business relationships and improve overall supply chain collaboration.
Got a question? Just drop us a line.