Course Outline

Introduction

  • The time and cost associated with managing cyber risks versus the potential costs resulting from supply chain disruptions.

Key Cyber Supply Chain Risks

  • Vulnerabilities in internally developed software and hardware
  • Vulnerabilities in third-party hardware and software
  • The level of internal security knowledge and practices
  • The level of third-party security knowledge and processes

Supply Chain Cyber Risk Case Study

  • Risk exposure through the use of third-party software

Tools and Techniques for Attacking a Supply Chain

  • Malware
  • Ransomware
  • Adware

Supply Chain Cyber Risk Case Study

  • Outsourcing to an external website builder

Cyber Supply Chain Security Principles

  • Assume that your system will be breached at some point.
  • Cybersecurity is a multifaceted challenge involving technology, people, processes, and knowledge.
  • Differentiate between physical security and cybersecurity measures.

Supply Chain Cyber Risk Case Study

  • Outsourcing data storage to a third-party provider

Assessing Your Organization's Risk Level

  • Review hardware and software design processes for security gaps.
  • Mitigate known vulnerabilities through proactive measures.
  • Stay informed about emerging vulnerabilities.
  • Continuously monitor production systems and processes for anomalies.

Supply Chain Cyber Risk Case Study

  • Cyber attacks conducted by internal team members

Internal Security Threats

  • Disgruntled employees as well as those who may not be overtly dissatisfied but still pose a risk.
  • Unauthorized access to login credentials.
  • Unsecured access to Internet of Things (IoT) devices.

Forming Collaborative Partnerships

  • Adopting a proactive rather than punitive approach to vendor risk management.
  • Achieving shared objectives through collaboration.
  • Fostering growth and innovation within the supply chain.
  • Mitigating risks through joint efforts and best practices.

A Model for Implementing Supply Chain Cyber Security for Government

  • Vetting suppliers to ensure they meet stringent security standards.
  • Establishing robust control mechanisms to monitor supplier performance.
  • Implementing continuous monitoring and improvement processes.
  • Providing comprehensive training and education programs for all stakeholders.
  • Deploying multiple layers of protection to enhance resilience.
  • Creating a dedicated cyber-crisis team to respond effectively to incidents.

Summary and Conclusion

Requirements

  • Experience with supply chains for government

Audience

  • Supply chain managers and stakeholders in the public sector
 7 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories