Organizations’ supply chains are growing increasingly interdependent and complex, the result of which is an ever-increasing attack surface that must be defended. Current supply chain security frameworks offer effective guidance to organizations to help mitigate their supply chains from attack. However, they are limited in their scope and impact and can be
Topic: Cybersecurity Supply Chain Risk Management (C-SCRM)
In this video we will examine the Cybersecurity Supply Chain Risk Management (C-SCRM) and mitigation tactic using cybersecurity risk design strategies to strengthen SCRM efforts for organizations directly involved in delivery of products, services, and solutions to the Federal government and all other tiers of the global supply chain.
Supply chain attacks, also referred to as value-chain or third-party attacks, occur when hackers are able to infiltrate a system using loopholes in third-party logistics providers. These types of high-value cyber-attacks, designed to disrupt operations, pose an increasingly significant risk to military equipment through the proliferation of counterfeit