Blog

On Demand Webinar - Beyond Your Trust: The Hidden Cyber Risk in NHS Supply Chains

Hidden Cyber Risks in NHS Supply Chains: From Technical Debt to Clinical Safety - Recording Below

On Demand Webinar - Beyond Your Trust: The Hidden Cyber Risk in NHS Supply ChainsOn Demand Webinar - Beyond Your Trust: The Hidden Cyber Risk in NHS Supply Chains

As NHS Trusts become increasingly digitally and operationally interconnected, cyber risk is no longer contained within organisational boundaries. Shared systems, common suppliers, and national services mean that incidents in one part of the ecosystem can rapidly impact others — with direct consequences for patient care, service continuity, and operational resilience.

In this panel discussion, senior security leaders from Royal Surrey NHS Foundation Trust and NHS England examine how cyber risk is evolving across the NHS, and why traditional, Trust-by-Trust security approaches are no longer sufficient. They explore how interdependencies across suppliers, platforms, and services can create pathways for disruption, lateral movement, and cascading failure at scale.

The session examines

  • How shared suppliers and services are reshaping the NHS cyber risk and threat landscape
  • Why collaboration between Trusts is becoming critical to drive resilience
  • Why third- and fourth-party dependencies now represent material risk
  • What recent incidents reveal about systemic vulnerability across the NHS

Designed for CISOs, Heads of IT, Information Governance, and Risk leaders, this webinar focuses on how NHS organisations can strengthen resilience in an increasingly interconnected environment, with clear, actionable takeaways.

Speakers

- Shaun van Niekerk

CISO - Royal Surrey NHS Foundation Trust

- Mark Logsdon

CISO - NHS England

Watch video
Blog

Download for free

By submitting this form, you agree to Risk Ledger’s Terms of Service, Privacy Policy, and Risk Ledger contacting you.

Thank you!
Download
Oops! Something went wrong while submitting the form.
Blog

Download for free

Download
Pattern Trapezoid Mesh

Get the security manager's briefing

Monthly research, case studies and practical guides you won't find anywhere else.

Join thousands of security managers turning their TPRM programmes into success stories.