Get in Touch

Course Outline

Introduction

  • The time and cost of cyber risk management compared to the time and cost incurred from a supply chain disruption.

Key Cyber Supply Chain Risks

  • In-house software and hardware vulnerabilities
  • Third-party hardware and software vulnerabilities
  • In-house security knowledge and practices
  • Third-party security knowledge and practices

Supply Chain Cyber Risk Case Study

  • Risk exposure through third-party software

Tools and Techniques for Attacking a Supply Chain

  • Malware
  • Ransomware
  • Adware

Supply Chain Cyber Risk Case Study

  • Outsourcing to an external website builder

Cyber Supply Chain Security Principles

  • Assume your system will be breached.
  • View cybersecurity as a problem involving technology, people, processes, and knowledge.
  • Distinguish between physical and cybersecurity.

Supply Chain Cyber Risk Case Study

  • Outsourcing data storage to a third-party provider

Assessing Your Organization's Risk Level

  • Hardware and software design processes
  • Mitigation of known vulnerabilities
  • Knowledge of emerging vulnerabilities
  • Monitoring of production systems and processes

Supply Chain Cyber Risk Case Study

  • Cyber attacks by internal members of the team

Internal Security Threats

  • Disgruntled and less-engaged employees
  • Access to login credentials
  • Access to IoT devices

Forming Collaborative Partnerships

  • Proactive versus punitive approaches to vendor risk
  • Achieving common objectives
  • Fostering growth
  • Mitigating risks

A Model for Implementing Supply Chain Cyber Security

  • Vetting suppliers
  • Establishing control
  • Continuous monitoring and improvement
  • Training and education
  • Implementing multiple layers of protection
  • Creating a cyber-crisis team

Summary and Conclusion

Requirements

  • Experience with supply chains

Audience

  • Supply chain managers and stakeholders
 7 Hours

Testimonials (3)

Upcoming Courses

Related Categories