Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking and Finance Review - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals
    Technology

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Published by Wanda Rich

    Posted on October 28, 2025

    5 min read

    Last updated: January 19, 2026

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals - Technology news and analysis from Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Tags:cybersecurityrisk managementfinancial lossdata breach

    Quick Summary

    61% suffered supply chain breaches in the past year, with almost a third suffering operational disruption and financial loss as a result

    61% suffered supply chain breaches in the past year, with almost a third suffering operational disruption and financial loss as a result

    LONDON, U.K. – 28 October 2025: Sixty per cent of surveyed U.K. and US cybersecurity leaders now admit that security risks originating from third parties and supply chain partners are “innumerable and unmanageable.” This is according to the latest The State of Information Security Report from IO (formerly ISMS.online), which reveals a growing disparity between cybersecurity confidence and reality.

    A surprising 97 per cent of cybersecurity leaders said they were confident in their breach response, with 61 per cent describing themselves as “very confident.” Yet, that confidence contrasts drastically with 61 per cent of leaders who noted their organisation had suffered a third-party or supply chain attack in the past 12 months. This further exemplifies the widening “confidence gap”, as business leaders back their resilience while supply chain compromises continue to cause widespread damage.

    Recent high-profile incidents, such as the Jaguar Land Rover attack, which disrupted production across multiple manufacturing plants, and the Collins Aerospace attack on its MUSE software which grounded several European airports to a halt, highlight how supply chain compromises can quickly cascade far beyond their initial target.

    Among those who suffered a third-party or supply chain attack, 38 per cent resulted in customer, employee or partner data breaches, 35 per cent suffered financial losses or unplanned costs (e.g. remediation, fines, legal fees), and 33 per cent faced temporary system outage or operational disruption. More than a third (36 per cent) of organisations that suffered a customer data breach said they had experienced customer or partner churn or loss of trust as a result, while 28 per cent faced heightened scrutiny from partners or suppliers.

    “Cybersecurity leaders clearly recognise the importance of supply chain security, but many still underestimate how complex and interdependent modern supply networks have become,” said Chris Newton-Smith, CEO of IO. “This confidence needs to be matched by continuous action to avoid the domino effect across networks, impacting customer trust, finances, and operations.”

    Despite the growing risk, only 23 per cent of all respondents ranked supply chain compromise among their top emerging threats, placing it below AI misuse, misinformation, and phishing. This suggests that while investment is rising, supply chain risk is still underestimated relative to its potential impact.

    While this year’s report focuses on the broader supply chain, it still underscores the disproportionate vulnerability of small and mid-sized businesses. Of those cybersecurity leaders within SMEs with up to 49 employees, 28 per cent reported supply chain disruption or cascading partner issues following a customer data breach, compared with 21 per cent of large enterprises. This suggests smaller firms are less able to contain the fallout of third-party incidents, often due to limited resources, smaller security teams, and fewer formal risk processes.

    “Attackers increasingly see smaller suppliers as soft entry points into larger targets,” added Newton-Smith. “They may not be the ultimate prize, but they’re often the route into the larger organisations. Securing the entire supply chain is essential for national and commercial resilience.”

    However, the research does demonstrate that investment in third-party and supply chain security is growing, as 64 per cent of organisations plan to increase spending in this area over the next year. This number drops to 45 per cent among smaller SMEs, who say budgets and investment will remain the same. Smaller firms are generally less likely to have a clear and well-communicated information security strategy, to invest in awareness training, or to strengthen crisis management and incident response capabilities, all key components of an effective resilience plan.

    Encouragingly, 80 per cent of organisations have already strengthened third-party and vendor risk management practices in the last 12 months or longer than 12 months, with a further 17 per cent planning to do so in the next 12 months. Meanwhile, 21 per cent of leaders list strengthening vendor and third-party risk management among their top cybersecurity priorities for the next 12 months, reflecting a clear shift toward long-term resilience planning.

    “Supply chain resilience is now one of the top security priorities for the year ahead, but this needs to be embedded within the organisation. To close the confidence gap, leaders must focus on people and process, putting strategies in place to ensure compliance and build a culture of security and resilience across the chain to avoid any weak links”, Newton-Smith added.

    -Ends-

    About IO
    At IO, we believe compliance should fuel progress, not hold it back.

    That's why we've built a modern compliance platform designed to help organisations simplify, strengthen, and scale their information security, privacy, risk and AI governance. Supporting over 100 global standards, including ISO 27001, ISO 27701, ISO 42001, SOC 2, and GDPR, IO gives teams everything they need to stay secure, aligned, and audit-ready in one place.

    Our approach is built around people, process, and platform, because lasting compliance isn't achieved through automation alone. With structured workflows, guided support, and smart integrations that fit how your business already works, IO makes it easier to embed compliance into everyday operations.

    From first-time certifications to mature multi-framework global programmes, IO helps reduce duplicated work, surface the right insights, and build confidence across your organisation. It's compliance that fits and scales with you.

    Trusted by thousands of businesses worldwide, IO is here to turn compliance from a box-ticking chore into a strategic advantage.

    Research methodology
    The research was conducted by Censuswide, among a sample of 3001 Cybersecurity and Information security Managers+ (18+) in the UK and USA. The data was collected between 23.07.2025 - 07.08.2025. A separate study was conducted among a sample of 1020 respondents who work in information security across the UK and USA between 22.03.2024 - 02.04.2024. Censuswide abides by and employs members of the Market Research Society and follows the MRS code of conduct and ESOMAR principles. Censuswide is also a member of the British Polling Council.

    Frequently Asked Questions about Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    1What is a data breach?

    A data breach is an incident where unauthorized individuals gain access to sensitive, protected, or confidential data, potentially leading to identity theft or financial loss.

    2What is risk management?

    Risk management is the process of identifying, assessing, and controlling threats to an organization's capital and earnings, including financial, operational, and reputational risks.

    3What is supply chain security?

    Supply chain security involves protecting the integrity and safety of the supply chain from threats such as cyberattacks, fraud, and physical damage.

    4What is operational disruption?

    Operational disruption refers to interruptions in business operations that can lead to financial losses, reduced productivity, and damage to reputation.

    5What is financial loss?

    Financial loss occurs when an organization experiences a decrease in its financial assets, often due to events like fraud, data breaches, or operational failures.

    More from Technology

    Explore more articles in the Technology category

    Image for Engineering Trust in the Age of Data: A Blueprint for Global Resilience
    Engineering Trust in the Age of Data: A Blueprint for Global Resilience
    Image for Over half of organisations predict their OT environments will be targeted by cyber attacks
    Over half of organisations predict their OT environments will be targeted by cyber attacks
    Image for Engineering Financial Innovation in Renewable Energy and Climate Technology
    Engineering Financial Innovation in Renewable Energy and Climate Technology
    Image for Industry 4.0 in 2025: Trends Shaping the New Industrial Reality
    Industry 4.0 in 2025: Trends Shaping the New Industrial Reality
    Image for Engineering Tomorrow’s Cities: On a Mission to Build Smarter, Safer, and Greener Mobility
    Engineering Tomorrow’s Cities: On a Mission to Build Smarter, Safer, and Greener Mobility
    Image for In Conversation with Faiz Khan: Architecting Enterprise Solutions at Scale
    In Conversation with Faiz Khan: Architecting Enterprise Solutions at Scale
    Image for Ballerine Launches Trusted Agentic Commerce Governance Platform
    Ballerine Launches Trusted Agentic Commerce Governance Platform
    Image for Maximising Corporate Visibility in a Digitally Driven Investment Landscape
    Maximising Corporate Visibility in a Digitally Driven Investment Landscape
    Image for The Digital Transformation of Small Business Lending: How Technology is Reshaping Credit Access
    The Digital Transformation of Small Business Lending: How Technology is Reshaping Credit Access
    Image for Navigating Data and AI Challenges in Payments: Expert Analysis by Himanshu Shah
    Navigating Data and AI Challenges in Payments: Expert Analysis by Himanshu Shah
    Image for Unified Namespace: A Practical 5-Step Approach to Scalable Data Architecture in Manufacturing
    Unified Namespace: A Practical 5-Step Approach to Scalable Data Architecture in Manufacturing
    Image for Designing AI Agents That Don’t Misbehave
    Designing AI Agents That Don’t Misbehave
    View All Technology Posts
    Previous Technology PostSecuring the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool
    Next Technology PostWhy AI's Promise of Efficiency May Break Tomorrow's Workforce