{"id":6138,"date":"2021-05-10T13:29:50","date_gmt":"2021-05-10T20:29:50","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=6138"},"modified":"2024-09-10T10:29:13","modified_gmt":"2024-09-10T17:29:13","slug":"scr-infographic2","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/scr-infographic2\/","title":{"rendered":"Supply Chain Risk Infographic 2021"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:center;\"><p><strong>Our supply chain risk analysis team has put together an infographic about supply chain risk in the microelectronics and semiconductor industry, summarizing macro trends at the intersection of supply chain,\u00a0 procurement, and cybersecurity.<\/strong><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-margin-top:50px;--awb-max-width:1000px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-glow imageframe-1 hover-type-none\" style=\"border:1px solid hsla(var(--awb-color8-h),var(--awb-color8-s),calc( var(--awb-color8-l) + 96% ),var(--awb-color8-a));border-radius:3px;-webkit-box-shadow: 0 0 7px var(--awb-color8);box-shadow: 0 0 7px var(--awb-color8);\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/objectsecurity.com\/infographic1\" target=\"_self\" aria-label=\"infographic2-new\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"410\" height=\"1024\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=410%2C1024&#038;ssl=1\" alt class=\"img-responsive wp-image-6141\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=66%2C165&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=120%2C300&amp;ssl=1 120w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=177%2C443&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=200%2C500&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=300%2C750&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=320%2C800&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=400%2C1000&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=410%2C1024&amp;ssl=1 410w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=460%2C1150&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=500%2C1250&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=540%2C1350&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=600%2C1500&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=669%2C1673&amp;ssl=1 669w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=700%2C1750&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=768%2C1920&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=800%2C2000&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?resize=819%2C2048&amp;ssl=1 819w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/08\/infographic2-new.png?fit=910%2C2275&amp;ssl=1 910w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 410px\" \/><\/a><\/span><\/div><div class=\"fusion-text fusion-text-2\"><p style=\"text-align: center;\"><span style=\"font-size: small;\"><span style=\"color: #c9c3c3;\">*) all source citations are in the report.<br \/>\nplease provide your email below to get your copy<\/span><\/span><\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button-border-radius-top-left:2px;--button-border-radius-top-right:2px;--button-border-radius-bottom-right:2px;--button-border-radius-bottom-left:2px;--button_margin-top:50px;\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/\"><span class=\"fusion-button-text\">Get the full report here<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":6251,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[69,70],"tags":[],"class_list":["post-6138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Supply Chain Risk Infographic 2021 - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/c688fa60da1e450fc35e71874b95c381\"},\"headline\":\"Supply Chain Risk Infographic 2021\",\"datePublished\":\"2021-05-10T20:29:50+00:00\",\"dateModified\":\"2024-09-10T17:29:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/\"},\"wordCount\":1652,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/infographic2-post.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"Company News\",\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/\",\"name\":\"Supply Chain Risk Infographic 2021 - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/infographic2-post.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2021-05-10T20:29:50+00:00\",\"dateModified\":\"2024-09-10T17:29:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/c688fa60da1e450fc35e71874b95c381\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/infographic2-post.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/infographic2-post.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/scr-infographic2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supply Chain Risk Infographic 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/c688fa60da1e450fc35e71874b95c381\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a8a4f463a6091862a31d34a11948335cd3262b8fc32d541303b0fffe142166c5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a8a4f463a6091862a31d34a11948335cd3262b8fc32d541303b0fffe142166c5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a8a4f463a6091862a31d34a11948335cd3262b8fc32d541303b0fffe142166c5?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"description\":\"ObjectSecurity LLC is a leader in solving complex, evolving defense and industrial cybersecurity and supply chain risk challenges that threaten national security and production downtime.\",\"sameAs\":[\"https:\\\/\\\/objectsecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Supply Chain Risk Infographic 2021 - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/scr-infographic2\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/scr-infographic2\/"},"author":{"name":"admin","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/c688fa60da1e450fc35e71874b95c381"},"headline":"Supply Chain Risk Infographic 2021","datePublished":"2021-05-10T20:29:50+00:00","dateModified":"2024-09-10T17:29:13+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/scr-infographic2\/"},"wordCount":1652,"image":{"@id":"https:\/\/objectsecurity.com\/scr-infographic2\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2021\/05\/infographic2-post.png?fit=600%2C337&ssl=1","articleSection":["Company News","General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/scr-infographic2\/","url":"https:\/\/objectsecurity.com\/scr-infographic2\/","name":"Supply Chain Risk Infographic 2021 - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/scr-infographic2\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/scr-infographic2\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2021\/05\/infographic2-post.png?fit=600%2C337&ssl=1","datePublished":"2021-05-10T20:29:50+00:00","dateModified":"2024-09-10T17:29:13+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/c688fa60da1e450fc35e71874b95c381"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/scr-infographic2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/scr-infographic2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/scr-infographic2\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2021\/05\/infographic2-post.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2021\/05\/infographic2-post.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/scr-infographic2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Supply Chain Risk Infographic 2021"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/c688fa60da1e450fc35e71874b95c381","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a8a4f463a6091862a31d34a11948335cd3262b8fc32d541303b0fffe142166c5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a8a4f463a6091862a31d34a11948335cd3262b8fc32d541303b0fffe142166c5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8a4f463a6091862a31d34a11948335cd3262b8fc32d541303b0fffe142166c5?s=96&d=mm&r=g","caption":"admin"},"description":"ObjectSecurity LLC is a leader in solving complex, evolving defense and industrial cybersecurity and supply chain risk challenges that threaten national security and production downtime.","sameAs":["https:\/\/objectsecurity.com"]}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2021\/05\/infographic2-post.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=6138"}],"version-history":[{"count":4,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6138\/revisions"}],"predecessor-version":[{"id":6143,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6138\/revisions\/6143"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/6251"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=6138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=6138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=6138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}