Course Outline
Introduction
- The time and cost associated with managing cyber risks versus the potential costs resulting from supply chain disruptions.
Key Cyber Supply Chain Risks
- Vulnerabilities in internally developed software and hardware
- Vulnerabilities in third-party hardware and software
- The level of internal security knowledge and practices
- The level of third-party security knowledge and processes
Supply Chain Cyber Risk Case Study
- Risk exposure through the use of third-party software
Tools and Techniques for Attacking a Supply Chain
- Malware
- Ransomware
- Adware
Supply Chain Cyber Risk Case Study
- Outsourcing to an external website builder
Cyber Supply Chain Security Principles
- Assume that your system will be breached at some point.
- Cybersecurity is a multifaceted challenge involving technology, people, processes, and knowledge.
- Differentiate between physical security and cybersecurity measures.
Supply Chain Cyber Risk Case Study
- Outsourcing data storage to a third-party provider
Assessing Your Organization's Risk Level
- Review hardware and software design processes for security gaps.
- Mitigate known vulnerabilities through proactive measures.
- Stay informed about emerging vulnerabilities.
- Continuously monitor production systems and processes for anomalies.
Supply Chain Cyber Risk Case Study
- Cyber attacks conducted by internal team members
Internal Security Threats
- Disgruntled employees as well as those who may not be overtly dissatisfied but still pose a risk.
- Unauthorized access to login credentials.
- Unsecured access to Internet of Things (IoT) devices.
Forming Collaborative Partnerships
- Adopting a proactive rather than punitive approach to vendor risk management.
- Achieving shared objectives through collaboration.
- Fostering growth and innovation within the supply chain.
- Mitigating risks through joint efforts and best practices.
A Model for Implementing Supply Chain Cyber Security for Government
- Vetting suppliers to ensure they meet stringent security standards.
- Establishing robust control mechanisms to monitor supplier performance.
- Implementing continuous monitoring and improvement processes.
- Providing comprehensive training and education programs for all stakeholders.
- Deploying multiple layers of protection to enhance resilience.
- Creating a dedicated cyber-crisis team to respond effectively to incidents.
Summary and Conclusion
Requirements
- Experience with supply chains for government
Audience
- Supply chain managers and stakeholders in the public sector
Testimonials (2)
I liked the approach of the teacher from the very beginning. The fact that he/she tailored the teaching to our needs, and when we encountered problems, he helped us with great interest.
flavia - ASOCIATIA PENTRU VIITORII PROFESIONISTI IN TEHNOLOGIA INFORMATIEI
Course - SAP Financial Accounting and Controlling (FICO) for Consultants
I found NobleProg very easy to work with, considering the timezone challenges and our difficulty with trainees requiring support in Japanese. Overall, working with you on this training was satisfactory and I would have no hesitation recommending your organisation. If a training need occurs for us in the ASPAC region again, I will be in touch with NobleProg.