{"id":3655,"date":"2022-07-04T14:10:55","date_gmt":"2022-07-04T14:10:55","guid":{"rendered":"https:\/\/locaterisk.com\/?p=3655"},"modified":"2025-08-08T07:27:58","modified_gmt":"2025-08-08T07:27:58","slug":"__lieferkettengesetz","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/__lieferkettengesetz\/","title":{"rendered":"IT Security and the Supply Chain Act: What to Do Now"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\"><strong><strong>IT Security and the Supply Chain Act:<br>What to Do Now<\/strong><\/strong><\/h1>\r\n            <p class=\"paragraph\">The Supply Chain Act obliges companies ( &gt; 3,000 employees from Jan. 1, 2023, &gt; 1,000 employees from Jan. 1, 2024) to demonstrate that they operate in a sustainable and socially just manner. This includes both the company's own organization and its shareholdings as well as suppliers and sub-suppliers. In short: the entire supply chain worldwide. From raw material extraction to product delivery. <br><br>Purchasing and compliance management are now more than ever required to continuously check the overall risks of suppliers. With LocateRisk security monitoring, this is already effortlessly possible in the area of IT security. The automated analyses continuously record, evaluate and document the external IT security situation of each organization and provide recommended actions for rapid risk mitigation. This ensures transparency in the supply chain, saves resources and contributes to trouble-free supply.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"534\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz-1024x534.png\" alt=\"\" class=\"wp-image-3658\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz-1024x534.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz-300x156.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz-768x400.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz-18x9.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">What exactly are companies expected to do under the Supply Chain Act?<\/h3>\n\n\n\n<p>Of course, companies cannot be held liable for all potential hazards in the supply chain. However, they are expected to know the risks of their suppliers and make efforts to take measures that help increase compliance standards. These efforts must be proven.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Supply Chain Act - What does it mean in terms of IT security?<\/strong><\/h3>\n\n\n\n<p>Those who have not already done so should also address the issue of IT security in the supply chain in the wake of the new Supply Chain Act. Collaboration between companies, suppliers and service providers is based on the shared use of personal data. This requires all participants to open up their own networks to external access. This must be adequately secured in order to minimize cyber attacks via the access points and the resulting data loss and downtime risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><b><strong><strong><strong>Why are attacks via the supply chain so threatening?<\/strong><\/strong><\/strong><\/b><\/h3>\n\n\n\n<p>If cyber criminals succeed in compromising a service provider or supplier, there is a risk of a chain reaction with incalculable effects on the supply chain. A well-known example of such a case is the attack on the American IT service provider Kaseya. By exploiting a vulnerability, the hackers managed to encrypt the data of hundreds of companies in the USA, Germany and Sweden. A few numbers smaller, but highly topical, is the attack on the IT service provider of the Darmstadt-based energy supplier Entega. The ransomware attack hit not only Entega but several customers at once, including the Frankfurter Entsorgungs- und Service-Gruppe (FES), the Mainzer Stadtwerke, Heag Holding as the group of Darmstadt municipal companies, Bauverein AG as the city's real estate company, Darmstadt's Eigenbetrieb f\u00fcr kommunale Aufgaben und Dienstleistungen (EAD), and several municipalities in the Odenwald region. Although critical infrastructures were not affected, homepages were no longer accessible and numerous online services were massively restricted. In addition, thousands of employees were unable to access their mail accounts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How IT security monitoring supports risk minimization<\/strong><\/h3>\n\n\n\n<p>The external IT attack surface of companies is constantly growing and changing. Complex infrastructures can no longer be monitored manually. At the same time, regulations such as IT Sig 2.0 and the EU-GDPR oblige companies to continuously improve the level of security. It is to be expected that this will also become relevant in the context of the Supply Chain Act.<\/p>\n\n\n\n<p>Automated IT security analyses from LocateRisk already helps numerous companies and institutions in systematically minimizing risk. They consolidate data from hundreds of sources into a risk report prioritized by criticality. Those responsible can see at a glance what the IT security situation of business partners and suppliers is, assign tasks directly and make decisions. The solution can be connected to various monitoring and reporting platforms such as Jira, Splunk, etc. for central administration.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>With IT security monitoring you can:<\/strong><\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check, evaluate and compare IT security of thousands of companies at the same time<\/li>\n\n\n\n<li>Demonstrate adherence to industry and procurement compliance requirements<\/li>\n\n\n\n<li>Document measures and activities to mitigate risks within the framework of the supply chain act<\/li>\n\n\n\n<li>Accelerate the business partner risk management process<\/li>\n\n\n\n<li>Save time and personnel resources through automated audits<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">IT security analyses for business partner risk management<\/h3>\n\n\n\n<p>Read now:&nbsp;<a href=\"https:\/\/locaterisk.com\/en\/landing\/geschaftspartner-risikomanagement\/\">Automated security audit of suppliers<\/a><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"__lieferkettengesetz\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The focus of the Supply Chain Act is on sustainability and human rights. But the topic of cybersecurity is also becoming relevant. Find out what you can already do today.<\/p>","protected":false},"author":8,"featured_media":3658,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[4,27],"class_list":["post-3655","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-it-sicherheit","tag-lieferkettengesetz"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist - LocateRisk<\/title>\n<meta name=\"description\" content=\"Im Fokus des neuen Lieferkettengesetzes stehen Nachhaltigkeit und Menschenrechte. Doch auch das Thema IT-Sicherheit ist relevant. Erfahren Sie, was Sie heute schon tun k\u00f6nnen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/__lieferkettengesetz\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Im Fokus des neuen Lieferkettengesetzes stehen Nachhaltigkeit und Menschenrechte. Doch auch das Thema IT-Sicherheit ist relevant. Erfahren Sie, was Sie heute schon tun k\u00f6nnen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/__lieferkettengesetz\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-04T14:10:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:27:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist\",\"datePublished\":\"2022-07-04T14:10:55+00:00\",\"dateModified\":\"2025-08-08T07:27:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/\"},\"wordCount\":671,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Visualisierung-Lieferkettengesetz.png\",\"keywords\":[\"IT-Sicherheit\",\"Lieferkettengesetz\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/\",\"name\":\"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Visualisierung-Lieferkettengesetz.png\",\"datePublished\":\"2022-07-04T14:10:55+00:00\",\"dateModified\":\"2025-08-08T07:27:58+00:00\",\"description\":\"Im Fokus des neuen Lieferkettengesetzes stehen Nachhaltigkeit und Menschenrechte. Doch auch das Thema IT-Sicherheit ist relevant. Erfahren Sie, was Sie heute schon tun k\u00f6nnen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Visualisierung-Lieferkettengesetz.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Visualisierung-Lieferkettengesetz.png\",\"width\":1080,\"height\":563,\"caption\":\"Photo Shutterstock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT security and the Supply Chain Act: What to do now - LocateRisk","description":"The new Supply Chain Act focuses on sustainability and human rights. But the topic of IT security is also relevant. Find out what you can already do today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/__lieferkettengesetz\/","og_locale":"en_US","og_type":"article","og_title":"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist - LocateRisk","og_description":"Im Fokus des neuen Lieferkettengesetzes stehen Nachhaltigkeit und Menschenrechte. Doch auch das Thema IT-Sicherheit ist relevant. Erfahren Sie, was Sie heute schon tun k\u00f6nnen.","og_url":"https:\/\/locaterisk.com\/en\/__lieferkettengesetz\/","og_site_name":"LocateRisk","article_published_time":"2022-07-04T14:10:55+00:00","article_modified_time":"2025-08-08T07:27:58+00:00","og_image":[{"width":1080,"height":563,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristina Breuer","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist","datePublished":"2022-07-04T14:10:55+00:00","dateModified":"2025-08-08T07:27:58+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/"},"wordCount":671,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png","keywords":["IT-Sicherheit","Lieferkettengesetz"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/","url":"https:\/\/locaterisk.com\/__lieferkettengesetz\/","name":"IT security and the Supply Chain Act: What to do now - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png","datePublished":"2022-07-04T14:10:55+00:00","dateModified":"2025-08-08T07:27:58+00:00","description":"The new Supply Chain Act focuses on sustainability and human rights. But the topic of IT security is also relevant. Find out what you can already do today.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/__lieferkettengesetz\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png","width":1080,"height":563,"caption":"Photo Shutterstock"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/3655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=3655"}],"version-history":[{"count":29,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/3655\/revisions"}],"predecessor-version":[{"id":6310,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/3655\/revisions\/6310"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/3658"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=3655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=3655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=3655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}