{"id":4760,"date":"2023-04-04T15:04:35","date_gmt":"2023-04-04T15:04:35","guid":{"rendered":"https:\/\/locaterisk.com\/?p=4760"},"modified":"2025-08-08T07:26:13","modified_gmt":"2025-08-08T07:26:13","slug":"mehr-sicherheit-in-der-lieferkette","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/mehr-sicherheit-in-der-lieferkette\/","title":{"rendered":"More security in the supply chain"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">More Security in the Supply Chain: LocateRisk Automates Supplier IT Risk Management <\/h1>\r\n            <p class=\"paragraph\"><strong>\u00a0\u00a0<\/strong><br>- LocateRisk launches solution for IT risk mitigation in supply chains<br>- The new platform is based on the non-invasive LocateRisk analysis technology <br>- Check and manage IT and DSGVO compliance automatically<br><br>With LocateRisk's IT risk analyses and monitoring, cyber risk prevention in Germany has already made significant progress. Using the platform, organizations of all sizes can effortlessly assess, continuously monitor, improve and prove the security of their IT environment at any time. Now, the cybersecurity specialists are championing greater security in the supply chain with a new SaaS platform. The fully automated solution makes it easier for companies to collaborate with business partners and suppliers to protect the security of their networks and supply chains.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"638\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement-1024x638.png\" alt=\"\" class=\"wp-image-4768\" style=\"width:1024px;height:638px\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement-1024x638.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement-300x187.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement-768x479.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement-18x12.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Automated risk assessments bring transparency to the supply chain and make potential risk suppliers identifiable at an early stage.  <\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Gain security with automated supplier risk management<\/strong><\/h3>\n\n\n\n<p>Predefined risk profiles, contextual assessments and efficient management functions contribute to efficient control. A performance dashboard, for example, provides an immediate overview of the audited companies. Using the risk matrix, it is possible to see directly how many companies have achieved which IT security level and to view the corresponding list with the individual security scores at the click of a mouse. In addition, filters for the development process provide a quick orientation for the control.<\/p>\n\n\n\n<p>Customizable email drafts and three result formats are available for proactive collaboration. Audited companies can view their report free of charge for one month to close potential security gaps as quickly as possible.<br><br><strong>Minimize risks preventively<\/strong><br>Cyber attacks on digital supply chains are a lucrative business for criminals. In most cases, a single vulnerability is enough to attack several companies at once. In view of the continuing increase in threats, the EU Commission is calling for effective measures to ensure IT security in supply chains in its cyber security directive NIS 2, which came into force in January. <\/p>\n\n\n\n<p>LocateRisk's business partner risk management enables exactly that, an objective, continuous control for the implementation of IT security and data protection requirements. Both sides, the contracting companies and their third-party companies, gain clarity and can preventively eliminate identified risks in a quick exchange.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>About LocateRisk<\/strong><br>LocateRisk GmbH is a German cyber security company that enables organizations to automate security assessments of IT systems and applications to minimize cyber risks. The SaaS platform is based on sophisticated technologies that generate non-invasive IT risk analyses at freely selectable intervals. The results can be used to preventively address potential vulnerabilities and prove the effectiveness of security measures. This accelerates the company's own IT risk management as well as that of third-party companies. The solutions are multi-client capable and are suitable as security evidence for cyber insurance as well as for use in due diligence audits.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br><br><br><\/h3>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"mehr-sicherheit-in-der-lieferkette\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>For prevention in global supply chains: LocateRisk has automated supplier IT risk management. <\/p>","protected":false},"author":8,"featured_media":4768,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[46,47,44,45],"class_list":["post-4760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-cyber-security-richtlinie-nis-2","tag-lieferanten-it-risikomanagement","tag-lieferanten-risikomanagement","tag-lieferkette"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mehr Sicherheit in der Lieferkette - LocateRisk<\/title>\n<meta name=\"description\" content=\"Zur Pr\u00e4vention in globalen Lieferketten: LocateRisk hat das Lieferanten-IT-Risikomanagement automatisiert. Erfahren Sie mehr\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/mehr-sicherheit-in-der-lieferkette\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mehr Sicherheit in der Lieferkette - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Zur Pr\u00e4vention in globalen Lieferketten: LocateRisk hat das Lieferanten-IT-Risikomanagement automatisiert. Erfahren Sie mehr\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/mehr-sicherheit-in-der-lieferkette\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-04T15:04:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:26:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"673\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"Mehr Sicherheit in der Lieferkette\",\"datePublished\":\"2023-04-04T15:04:35+00:00\",\"dateModified\":\"2025-08-08T07:26:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/\"},\"wordCount\":472,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/LocateRisk_IT-Lieferanten-Risikomanagement.png\",\"keywords\":[\"Cyber-Security-Richtlinie NIS 2\",\"Lieferanten-IT-Risikomanagement\",\"Lieferanten-Risikomanagement\",\"Lieferkette\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/\",\"name\":\"Mehr Sicherheit in der Lieferkette - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/LocateRisk_IT-Lieferanten-Risikomanagement.png\",\"datePublished\":\"2023-04-04T15:04:35+00:00\",\"dateModified\":\"2025-08-08T07:26:13+00:00\",\"description\":\"Zur Pr\u00e4vention in globalen Lieferketten: LocateRisk hat das Lieferanten-IT-Risikomanagement automatisiert. Erfahren Sie mehr\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/LocateRisk_IT-Lieferanten-Risikomanagement.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/LocateRisk_IT-Lieferanten-Risikomanagement.png\",\"width\":1080,\"height\":673,\"caption\":\"Automatisierte Lieferanten-Risikobewertungen bringen Transparenz in die Lieferkette.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mehr-sicherheit-in-der-lieferkette\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mehr Sicherheit in der Lieferkette\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"More security in the supply chain - LocateRisk","description":"For prevention in global supply chains: LocateRisk has automated supplier IT risk management. Learn more","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/mehr-sicherheit-in-der-lieferkette\/","og_locale":"en_US","og_type":"article","og_title":"Mehr Sicherheit in der Lieferkette - LocateRisk","og_description":"Zur Pr\u00e4vention in globalen Lieferketten: LocateRisk hat das Lieferanten-IT-Risikomanagement automatisiert. Erfahren Sie mehr","og_url":"https:\/\/locaterisk.com\/en\/mehr-sicherheit-in-der-lieferkette\/","og_site_name":"LocateRisk","article_published_time":"2023-04-04T15:04:35+00:00","article_modified_time":"2025-08-08T07:26:13+00:00","og_image":[{"width":1080,"height":673,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristina Breuer","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"Mehr Sicherheit in der Lieferkette","datePublished":"2023-04-04T15:04:35+00:00","dateModified":"2025-08-08T07:26:13+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/"},"wordCount":472,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement.png","keywords":["Cyber-Security-Richtlinie NIS 2","Lieferanten-IT-Risikomanagement","Lieferanten-Risikomanagement","Lieferkette"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/","url":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/","name":"More security in the supply chain - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement.png","datePublished":"2023-04-04T15:04:35+00:00","dateModified":"2025-08-08T07:26:13+00:00","description":"For prevention in global supply chains: LocateRisk has automated supplier IT risk management. Learn more","breadcrumb":{"@id":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/04\/LocateRisk_IT-Lieferanten-Risikomanagement.png","width":1080,"height":673,"caption":"Automatisierte Lieferanten-Risikobewertungen bringen Transparenz in die Lieferkette."},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/mehr-sicherheit-in-der-lieferkette\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Mehr Sicherheit in der Lieferkette"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=4760"}],"version-history":[{"count":16,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4760\/revisions"}],"predecessor-version":[{"id":6304,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4760\/revisions\/6304"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/4768"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=4760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=4760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=4760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}