
Sign up to save your podcasts
Or


You don’t control the technology your business runs on.
That’s an uncomfortable reality.
But the truth is: your infrastructure runs on foreign technology.
Your data depends on external suppliers.
And if they fail – you feel it.
The EU has decided to step in.
In this episode of Threat Talks, Lokke Moerel (Professor of Global ICT Law at Tilburg University and leading expert in EU cybersecurity regulation) breaks down how Europe’s new cybersecurity package is reshaping supply chain security.
Because this is not just about audits.
From Chinese components embedded in infrastructure to US-controlled cloud services, organizations are relying on suppliers that sit outside their control. And that creates a different kind of risk. Not just technical – but strategic.
The EU is now responding with a structural shift:
This changes how supply chain security works.
For CISOs and security leaders, the message is clear:
If your cybersecurity risk mitigation strategies don’t account for dependency on external suppliers, you’re exposed.
Timestamps
00:00 – Your Vendor Passed the Audit—Why You’re Still Exposed
01:32 – The EU Cybersecurity Landscape: What’s Changing Now
04:06 – The Supply Chain Problem: Why Current Cybersecurity Risk Mitigation Strategies Fail
08:39 – What This Means: New Rules for Critical Suppliers and Infrastructure
17:13 – What Organizations Must Do Now to Strengthen Cybersecurity Risk Mitigation Strategies
20:34 – Geopolitics vs Security: Will Certain Suppliers Be Restricted?
25:07 – Innovation vs Regulation: Are We Heading for a Two-Speed Market?
28:36 – Practical Next Steps: How to Prepare Your Supply Chain Today
29:27 – Key Takeaways and Final Thoughts
Key Topics Covered
Resources
Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.
🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: / @threattalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUE...
► APPLE: https://podcasts.apple.com/us/podcast...
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/
🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
By Threat TalksYou don’t control the technology your business runs on.
That’s an uncomfortable reality.
But the truth is: your infrastructure runs on foreign technology.
Your data depends on external suppliers.
And if they fail – you feel it.
The EU has decided to step in.
In this episode of Threat Talks, Lokke Moerel (Professor of Global ICT Law at Tilburg University and leading expert in EU cybersecurity regulation) breaks down how Europe’s new cybersecurity package is reshaping supply chain security.
Because this is not just about audits.
From Chinese components embedded in infrastructure to US-controlled cloud services, organizations are relying on suppliers that sit outside their control. And that creates a different kind of risk. Not just technical – but strategic.
The EU is now responding with a structural shift:
This changes how supply chain security works.
For CISOs and security leaders, the message is clear:
If your cybersecurity risk mitigation strategies don’t account for dependency on external suppliers, you’re exposed.
Timestamps
00:00 – Your Vendor Passed the Audit—Why You’re Still Exposed
01:32 – The EU Cybersecurity Landscape: What’s Changing Now
04:06 – The Supply Chain Problem: Why Current Cybersecurity Risk Mitigation Strategies Fail
08:39 – What This Means: New Rules for Critical Suppliers and Infrastructure
17:13 – What Organizations Must Do Now to Strengthen Cybersecurity Risk Mitigation Strategies
20:34 – Geopolitics vs Security: Will Certain Suppliers Be Restricted?
25:07 – Innovation vs Regulation: Are We Heading for a Two-Speed Market?
28:36 – Practical Next Steps: How to Prepare Your Supply Chain Today
29:27 – Key Takeaways and Final Thoughts
Key Topics Covered
Resources
Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.
🔔 Follow and Support our channel! 🔔
===
► YOUTUBE: / @threattalks
► SPOTIFY: https://open.spotify.com/show/1SXUyUE...
► APPLE: https://podcasts.apple.com/us/podcast...
👕 Receive your Threat Talks T-shirt
https://threat-talks.com/
🗺️ Explore the Hack's Route in Detail 🗺️
https://threat-talks.com
🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX