Industryweek 14372 Cybersecurity
Industryweek 14372 Cybersecurity
Industryweek 14372 Cybersecurity
Industryweek 14372 Cybersecurity
Industryweek 14372 Cybersecurity

Can’t Turn Back Time: Cybersecurity Must Be Dealt With

Jan. 3, 2017
80% of all cyber breaches occur in the supply chain, but too many companies are acting like the problem will fix itself.

Even though our new President-elect Trump believes that “The whole age of computers has made it where nobody knows exactly what’s going on. We have speed, we have a lot of other things, but I’m not sure you have the kind of security that you need,” it’s too late for people (and businesses) to abandon technology to communicate and transact business and go back to sending handwritten notes sent via courier to keep information secure (other than on a rare occasion) as he prefers.

As I’ve mentioned before, if we are to operate in the global supply chain we need to understand that there are many risks involved, including cybersecurity. Organizations—supply chain and otherwise—need to identify the potential risks (information security included), estimate both their potential impact on our organization and the likelihood of them occurring, and put together a mitigation strategy to avoid the most likely high-impact risks.

In a paper presented at the 2016 RSA Conference by Jon Boyens of the National Institute for Standards (NIST) titled, “Integrating Cybersecurity into Supply Chain Risk Management,” it was pointed out that there are three trends exacerbating cyber risks to supply chains:

• Internet of Things—everything is smart and interconnected.

• IT-enabled supply chain management—product and supply chain data run on top of business software that connects supply chains, and weak links abound globally.

• 3-D printing—production is going viral and digital.

These trends can result in a variety of negative consequences, including the delivery of poor quality, compromised or counterfeit products that diminish brand reputation, loss of intellectual property shared with supply chain partners, access to company IT networks, customer information, or operational control systems through supplier access impact on revenues, brand reputation and shareholder value.

More surprising perhaps was that Boyens’ paper mentions that 80% of all cyber breaches occur in the supply chain, and that 72% of companies don’t have full visibility into their supply chains.

To relate this in terms we can understand, some examples include:

• Supplier-provided keyboard software gave hackers access to owner data on 600 million Samsung Galaxy phones.

• Poor information security by service suppliers led to data breaches at Target, Home Depot, Goodwill, and many companies and organizations.

The findings of the presentation concluded that existing tools to mitigate other types of supply chain risk are also relevant for cyber risks, and that best practices and tools to mitigate cyber risks in the supply chain often exist in other parts of the company. Furthermore, we also need to be aware that other functions such as R&D, engineering, etc., affect cyber risks in the supply chain.

So, on a national security level, if our new President openly doubts the intelligence community’s ability to accurately assign risks and responsibility for cyber attacks, he could find it difficult to identify and fend off cyber attackers. The same could be said from a business perspective as well.

Popular Sponsored Recommendations

The Next-Gen Strategy for Delivering on Your Supply Chain Commitments

March 26, 2024
Manufacturers are struggling to provide the necessary customer experience to their external ecosystem. Read this whitepaper to learn about supply chain convergence – and why it...

Beware Extreme Software

Sept. 24, 2023
As a manufacturer, you understand the importance of staying ahead of the curve and being proactive in your approach to technology. With the rapid pace of change in the industry...

The Ultimate Guide for Surviving Economic Uncertainty & Supply Chain Disruption

March 13, 2024
Are disruptive external forces putting a squeeze on your supply chain? Nulogy can help. Access our Survival Guide to uncover 5 critical areas of investment for external supply...

You Cannot Stay Competitive by Bolting New Technologies to a Legacy ERP

Oct. 20, 2023
Read this white paper to understand the benefits of shifting to a next-generation ERP system as part of a DOP.

Voice your opinion!

To join the conversation, and become an exclusive member of IndustryWeek, create an account today!