In previous posts, I discussed supply chain assurance, it’s importance and examples for consequences of a supply chain breach.
With the recent surge of data breaches, government enterprises such as the Department of Defense and the Department of Homeland Security, as well as their suppliers, have increased their focus on IT security.
Supply chain security seemed like child’s play when it consisted of a small handful of companies that operated in a paper- and pen-based world.
Sony, Target, Staples, Home Depot and JPMorgan Chase all know a thing or two about the negative fallout of a cyberattack.
There’s no doubt about it—today’s globalized, Internet-driven supply chains are built for cost efficiency and optimized for speed.
There’s no doubt about it—today’s globalized, Internet-driven supply chains are built for cost efficiency and optimized for speed. Yet while modern supply chain proficiencies improve product cost and quality, they also can put your IT purchase at risk if your provider has weak supply chain protocols.
My name is Brett Bennett and I am the Director of Cyber Supply Chain Security at CyberCore Technologies (CyberCore).