21 May 2026
by Steve Jewell

Securing the UK’s interconnected supply chain: managing emerging sub-tier risks across defence and critical national infrastructure

Guest blog by Steve Jewell, Chief Executive Officer at Nine23 #techUKSupplyChainSecurityWeek

Steve Jewell

Steve Jewell

Chief Executive Officer, Nine23

Introduction

Modern threat actors increasingly exploit subtier suppliers within the defence and CNI ecosystem, recognising that these smaller organisations often lack the governance, assurance mechanisms, and security maturity found at prime contractors or regulated operators. Rather than attempting to breach a well protected defence prime or CNI asset directly, adversaries target lower tier manufacturers, niche technology providers, managed service partners, and logistics specialists. These entities routinely hold privileged access, sensitive design or operational data, integration responsibilities, or trusted digital pathways, making them effective vectors for lateral movement into the wider enterprise.

Once established inside a sub-tier supplier, hostile actors can conduct a range of quiet, sustained activities: the manipulation of software updates or build pipelines; the insertion of counterfeit, tampered, or vulnerable hardware components; credential harvesting; or reconnaissance to map upstream dependencies. The inherently complex, opaque, and globally distributed nature of modern defence and CNI supply networks means these compromises can persist undetected for extended periods. As a result, risk can propagate across what functions less as a linear supply chain and more as an interconnected “Supply Web”, where compromise at one node can have system-wide consequences.

Increasingly, these intrusions take the form of twin cyber–physical attacks, where digital compromise is enabled or reinforced by physical access—and vice versa. A cyber breach may begin with classic digital tradecraft such as credential theft, malware deployment, or corrupted firmware, but its success may depend on a physical enabler: access to a production line, coercion or manipulation of an insider, or interference with a testing or assurance process. Equally, a physical intrusion (connecting an unauthorised device, tampering with components, or breaching a storage or transport environment) may be coordinated to support a broader cyber operation.

There is an increasing cross-over between the domains to which supply chain management has been applied. The physical domain is now impacted by both the IT security (Cyber) domain, such as O/T and Service provision. Examples of which are clearly seen in industries such as construction where the provenance of materials and equipment now needs to consider embedded technologies and the numerous suppliers involved in monitoring, maintenance, obsolescence and disposal.

1. Emerging technologies in the supply chain: enablers and risks

Emerging technologies (cloud platforms, AI models, digital twins, and connected operational systems) offer enormous opportunity but also introduce new attack surfaces. Without governance, they amplify systemic risk across entire ecosystems.

  • Cloud platforms improve collaboration but increase dependency complexity.
  • AI models enabling predictive assurance while creating Shadow AI risks.
  • Digital twins accelerate sustainment but introduce sensitive data exposure.
  • Autonomous and semi‑autonomous platforms driving Defence advantage but reshaping security boundaries.

The dependence of these technologies on significant capacity for compute, high density power – and the associated cooling) is increasing dependence on 3rd party provision from hyperscalers or shared infrastructure models. As a result, it is increasingly important to identify the risks to resilience that these shared services carry as options for mitigation may be limited or need to consider alternative approaches to achieve the business outcome, rather than technology resilience only.

2. Wholistic approach

There are a wide range of tools and services already available for threat evaluation, vulnerability assessment, security monitoring, supplier governance, software development, system health and availability; but these are not yet integrated to provide a wholistic view of the security posture and most impactful risks facing an organisation or the service(s) delivered to their customers.

Nine23 has been working with specialist partners, such as Veriom who provide tool set to identify the root-causes of vulnerabilities in software and fix them at source; Arqit, who provide PQC encryption technology and provide the ability to assess the data-in-transit; alongside tools that are monitoring infrastructure, network, boundaries and beyond. The aim being to provide visibility of the most significant risks to an organisation, based on the context of operation, that could come from within or via the complex supplier networks on which they rely.

3. Driving accountability across the supply chain

Accountability must scale across every node of the Supply Chain (primes, SMEs, cloud services, toolchain providers, integrators, and subcontractors). Nine23 enforces accountability through:

  • Evidence‑based assurance frameworks (not self-attestation)
  • Intelligent Customer (IC) oversight embedded into governance• Milestone‑triggered call‑off delivery models for transparency
  • Clear Supply Chain Security Requirements aligned to Defence standards

4. Global alignment and best practice

Supply Chain security depends on coherence with international frameworks: NCSC Cloud Principles, UK Government Security Classifications, DEF STAN 05‑138, DCPP, CSM, and broader global standards. Nine23 ensures organisations remain interoperable and secure in multinational ecosystems.

5. National security: supply chains as critical assets

Supply Chains underpin the UK's Defence, economic stability, and national resilience. Governments must strengthen governance, incentivise maturity, and embed Secure by Design expectations across critical projects.

6. Defence: AI, autonomy and the future digital backbone

AI introduces powerful capability for Defence sustainment, autonomy, and data‑driven decision-making. But Shadow AI, model poisoning, and uncontrolled LLM usage create new risks. Nine23 addresses this through AI governance, safe tooling environments, and SbD- aligned integration into platform lifecycles.

Conclusion

Modern supply chains have become complex networks of equipment, software and service components — interconnected, interdependent, and strategically vital. Nine23’s Secure by Design approach ensures emerging technologies strengthen resilience rather than undermine it. As TechUK launches the Supply Chain Security Playbook, Nine23 is proud to contribute practical, proven methods for securing the UK’s digital and Defence future.


techUK Supply Chain Security Campaign Week 2026

Explore the technologies, policies and partnerships shaping the future of secure and resilient supply chains across the UK. From third-party cyber risk to defence, AI and operational resilience, Supply Chain Security Campaign Week brings together expert insight on the challenges organisations are facing and how industry is responding. Follow the week to stay informed and connected to the evolving threat landscape.

Explore campaign

 

Securing the chain: innovation, accountability and resilience in supply chain security webinar

Explore how organisations are strengthening supply chain security through innovation, accountability and resilience. Gain insight into emerging technologies, regulatory approaches and practical strategies for managing cyber risk across complex supply chains. Join the webinar to understand how industry and government are responding to an evolving threat landscape.

Book now

 


Cyber Resilience Programme activities

techUK brings together key players across the cyber security sector to promote leading-edge UK capabilities, build networks and grow the sector. techUK members have the opportunity to network, share ideas and collaborate, enabling the industry as a whole to address common challenges and opportunities together. Visit the programme page here.

 

Upcoming events

Latest news and insights 

Learn more and get involved

 

Cyber Resilience updates

Sign-up to get the latest updates and opportunities from our Cyber Resilience programme.

 

 

Here are the five reasons to join the Cyber Resilience programme

Download

Join techUK groups

techUK members can get involved in our work by joining our groups, and stay up to date with the latest meetings and opportunities in the programme.

Learn more

 

Become a techUK member

Our members develop strong networks, build meaningful partnerships and grow their businesses as we all work together to create a thriving environment where industry, government and stakeholders come together to realise the positive outcomes tech can deliver.

Learn more


Email _ Book now _ Annual Dinner 2026 (1).png

 

 Meet the team 

Jill Broom

Jill Broom

Head of Cyber Resilience, techUK

Jill leads the techUK Cyber Resilience programme, having originally joined techUK in October 2020 as a Programme Manager for the Cyber and Central Government programmes. She is responsible for managing techUK's work across the cyber security ecosystem, bringing industry together with key stakeholders across the public and private sectors. Jill also provides the industry secretariat for the Cyber Growth Partnership, the industry and government conduit for supporting the growth of the sector. A key focus of her work is to strengthen the public–private partnership across cyber to support further development of UK cyber security and resilience policy.

Before joining techUK, Jill worked as a Senior Caseworker for an MP, advocating for local communities, businesses and individuals, so she is particularly committed to techUK’s vision of harnessing the power of technology to improve people’s lives. Jill is also an experienced editorial professional and has delivered copyediting and writing services for public-body and SME clients as well as publishers.

Email:
[email protected]
Website:
www.techuk.org/
LinkedIn:
https://www.linkedin.com/in/jill-broom-19aa824

Read lessmore

Annie Collings

Annie Collings

Senior Programme Manager, Cyber Resilience, techUK

Annie is the Programme Manager for Cyber Resilience at techUK. She first joined as the Programme Manager for Cyber Security and Central Government in September 2023. 

In her role, Annie supports the Cyber Security SME Forum, engaging regularly with key government and industry stakeholders to advance the growth and development of SMEs in the cyber sector. Annie also coordinates events, engages with policy makers and represents techUK at a number of cyber security events.

Before joining techUK, Annie was an Account Manager at a specialist healthcare agency, where she provided public affairs support to a wide range of medical technology clients. She also gained experience as an intern in both an MP’s constituency office and with the Association of Independent Professionals and the Self-Employed. Annie holds a degree in International Relations from Nottingham Trent University.

Email:
[email protected]
Twitter:
anniecollings24
LinkedIn:
https://www.linkedin.com/in/annie-collings-270150158/

Read lessmore

Olivia Staples

Olivia Staples

Junior Programme Manager - Cyber Resilience, techUK

Olivia Staples joined techUK in May 2025 as a Junior Programme Manager in the Cyber Resilience team.

She supports the programs mission to promote cyber resilience by engaging key commercial and government stakeholders to shape the cyber resilience policy towards increased security and industry growth. Olivia assists in member engagement, event facilitation and communications support.

Before joining techUK, Olivia gained experience in research, advocacy, and strategic communications across several international organisations. At the Munich Security Conference, she supported stakeholder engagement and contributed to strategic communications. She also worked closely with local and national government stakeholders in Spain and Italy, where she was involved in policy monitoring and advocacy for both public and private sector clients.

Olivia holds an MSc in Political Science (Comparative Politics and Conflict Studies) from the London School of Economics (LSE) and a BA in Spanish and Latin American Studies from University College London (UCL).

Outside of tech, Olivia enjoys volunteering with local charities and learning Norwegian.

Email:
[email protected]

Read lessmore

 

 

 

 

Authors

Steve Jewell

Steve Jewell

Chief Executive Officer, Nine23