- Experience with supply chains
Audience
- Supply chain managers and stakeholders
This instructor-led, live training (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Introduction
- The time and cost of cyber risk management vs the time and cost from a disruption to the supply chain.
Key Cyber Supply Chain Risks
- In-house software and hardware vulnerabilities
- Third party hardware and software vulnerabilities
- In-house security knowledge and practices
- Third-party security knowledge and practices
Supply Chain Cyber Risk Case Study
- Risk exposure through third-party software
Tools and Techniques for Attacking a Supply Chain
- Malware
- Ransomware
- Adware
Supply Chain Cyber Risk Case Study
- Outsourcing to an external website builder
Cyber Supply Chain Security Principles
- Assume your system will be breached.
- Cybersecurity as a technology + people + process + knowledge problem.
- Physical vs cybersecurity
Supply Chain Cyber Risk Case Study
- Outsourcing data storage to a third-party provider
Assessing Your Organization's Risk Level
- Hardware and software design processes
- Mitigation of known vulnerabilities
- Knowledge of emerging vulnerabilities
- Monitoring of production systems and processes
Supply Chain Cyber Risk Case Study
- Cyber attacks by internal members of the team
Internal Security Threats
- Disgruntled employees and not so-disgruntled employees
- Access to login credentials
- Access IoT devices
Forming Collaborative Partnerships
- Proactive vs punitive approach to vendor risk
- Achieving a common objective
- Fostering growth
- Mitigating risks
A Model for Implementing Supply Chain Cyber Security
- Vetting suppliers
- Establishing control
- Continuous monitoring and improvement
- Training and education
- Implementing multiple layers of protection
- Creating a cyber-crisis team
Summary and Conclusion
United Arab Emirates - Managing Cyber Risks in the Supply Chain
Qatar - Managing Cyber Risks in the Supply Chain
Egypt - Managing Cyber Risks in the Supply Chain
Saudi Arabia - Managing Cyber Risks in the Supply Chain
South Africa - Managing Cyber Risks in the Supply Chain
Brasil - Managing Cyber Risks in the Supply Chain
Canada - Managing Cyber Risks in the Supply Chain
中国 - Managing Cyber Risks in the Supply Chain
香港 - Managing Cyber Risks in the Supply Chain
澳門 - Managing Cyber Risks in the Supply Chain
台灣 - Managing Cyber Risks in the Supply Chain
USA - Managing Cyber Risks in the Supply Chain
Österreich - Managing Cyber Risks in the Supply Chain
Schweiz - Managing Cyber Risks in the Supply Chain
Deutschland - Managing Cyber Risks in the Supply Chain
Czech Republic - Managing Cyber Risks in the Supply Chain
Denmark - Managing Cyber Risks in the Supply Chain
Estonia - Managing Cyber Risks in the Supply Chain
Finland - Managing Cyber Risks in the Supply Chain
Greece - Managing Cyber Risks in the Supply Chain
Magyarország - Managing Cyber Risks in the Supply Chain
Ireland - Managing Cyber Risks in the Supply Chain
Luxembourg - Managing Cyber Risks in the Supply Chain
Latvia - Managing Cyber Risks in the Supply Chain
España - Managing Cyber Risks in the Supply Chain
Italia - Managing Cyber Risks in the Supply Chain
Lithuania - Managing Cyber Risks in the Supply Chain
Nederland - Managing Cyber Risks in the Supply Chain
Norway - Managing Cyber Risks in the Supply Chain
Portugal - Managing Cyber Risks in the Supply Chain
România - Managing Cyber Risks in the Supply Chain
Sverige - Managing Cyber Risks in the Supply Chain
Türkiye - Managing Cyber Risks in the Supply Chain
Malta - Managing Cyber Risks in the Supply Chain
Belgique - Managing Cyber Risks in the Supply Chain
France - Managing Cyber Risks in the Supply Chain
日本 - Managing Cyber Risks in the Supply Chain
Australia - Managing Cyber Risks in the Supply Chain
Malaysia - Managing Cyber Risks in the Supply Chain
New Zealand - Managing Cyber Risks in the Supply Chain
Philippines - Managing Cyber Risks in the Supply Chain
Singapore - Managing Cyber Risks in the Supply Chain
Thailand - Managing Cyber Risks in the Supply Chain
Vietnam - Managing Cyber Risks in the Supply Chain
India - Managing Cyber Risks in the Supply Chain
Argentina - Managing Cyber Risks in the Supply Chain
Chile - Managing Cyber Risks in the Supply Chain
Costa Rica - Managing Cyber Risks in the Supply Chain
Ecuador - Managing Cyber Risks in the Supply Chain
Guatemala - Managing Cyber Risks in the Supply Chain
Colombia - Managing Cyber Risks in the Supply Chain
México - Managing Cyber Risks in the Supply Chain
Panama - Managing Cyber Risks in the Supply Chain
Peru - Managing Cyber Risks in the Supply Chain
Uruguay - Managing Cyber Risks in the Supply Chain
Venezuela - Managing Cyber Risks in the Supply Chain
Polska - Managing Cyber Risks in the Supply Chain
United Kingdom - Managing Cyber Risks in the Supply Chain
South Korea - Managing Cyber Risks in the Supply Chain
Pakistan - Managing Cyber Risks in the Supply Chain
Sri Lanka - Managing Cyber Risks in the Supply Chain
Bulgaria - Managing Cyber Risks in the Supply Chain
Bolivia - Managing Cyber Risks in the Supply Chain
Indonesia - Managing Cyber Risks in the Supply Chain
Kazakhstan - Managing Cyber Risks in the Supply Chain
Moldova - Managing Cyber Risks in the Supply Chain
Morocco - Managing Cyber Risks in the Supply Chain
Tunisia - Managing Cyber Risks in the Supply Chain
Kuwait - Managing Cyber Risks in the Supply Chain
Oman - Managing Cyber Risks in the Supply Chain
Slovakia - Managing Cyber Risks in the Supply Chain
Kenya - Managing Cyber Risks in the Supply Chain
Nigeria - Managing Cyber Risks in the Supply Chain
Botswana - Managing Cyber Risks in the Supply Chain
Slovenia - Managing Cyber Risks in the Supply Chain
Croatia - Managing Cyber Risks in the Supply Chain
Serbia - Managing Cyber Risks in the Supply Chain
Bhutan - Managing Cyber Risks in the Supply Chain