Supply chain attacks, also referred to as value-chain or third-party attacks, occur when hackers are able to infiltrate a system using loopholes in third-party logistics providers. These types of high-value cyber-attacks, designed to disrupt operations, pose an increasingly significant risk to military equipment through the proliferation of counterfeit electronic components, which have the potential to delay missions and ultimately jeopardize service members. When supply chain disruptive events occur, many supply chains tend to break down, taking substantial time to restore operations. Irrespective of these disruptive outages or if you will discontinuity in operations, some supply chains are able to operate in a degraded environment as well as continue to satisfy their customers, both before and after serious disruptive events. Organizations such National Institute for Standards (NIST), North American Transmission Forum (NATF) and other respective organizations and supply chain managers have developed cost effective and time efficient risk mitigation strategies to protect against inevitable threats. In this video we will examine the Cybersecurity Supply Chain Risk Management (C-SCRM) and mitigation tactic using cybersecurity risk design strategies to strengthen SCRM efforts for organizations directly involved in delivery of products, services, and solutions to the Federal government and all other tiers of the global supply chain.
CAC/PIV holders can watch or download the podcast here: