Despite the socio-economic importance of tools and techniques for handling security threats there is still no easy, structured, standardized and trusted way to forecast, prevent and manage interrelated and propagated cybersecurity vulnerabilities and threats in a way that takes into account the heterogeneity and complexity of today’s supply chains.