7.26.2015


Above: By Khan and Estay in Technology Information Management Review

Writing in the recent CSCMP Supply Chain Quarterly, Drew Smith explains:

The flexibility, scalability, and efficiency of the technology that enables information sharing has created additional points of access to an organization's proprietary information, increasing the risk that the corporate knowledge that drives profitability may fall into the wrong hands. Particularly vulnerable are those processes and activities that involve the sharing of information between external supply chain partners.That is why supply chain managers must play a larger role in cybersecurity—the measures taken to protect a computer, computer network, or data from unauthorized access or attack. They need to be aware of what the risks are and of which areas of their supply chain may be vulnerable to cyberattacks. And they must make sure that not only their own company but also their suppliers are following best practices in cybersecurity.

I have been absent from this blog while attending the annual Aspen Security Forum.  I seemed to be the only supply chain jockey at the session.  But cyber certainly got a lot of attention (regarding which I have provided a summary at Homeland Security Watch).  It is clear that many perceive we are already engaged in cyber-wars that will get worse in the years ahead.

One of the reasons I was in Aspen is the judgment of some that "supply chain will be the next cyber," in other words, supply chain already is -- and will soon be recognized as -- a crucial national security issue.  Partly this is because cyber is mostly a means to certain ends... which, among others, involve supplying Americans with the water, food, pharmaceuticals, and other necessities to survive.

No comments:

Post a Comment