Mechanisms exist to obtain cybersecurity & data privacy technologies from different suppliers to minimize supply chain risk.