A technology company relies entirely on a single, highly specialized supplier in a geopolitically unstable region for a critical processor chip.
A risk analysis identifies this as a high-impact vulnerability.
Which of the following is the most effective and proactive risk mitigation strategy?