Reduce Cyber Supply Chain Risks When Integrating New Technology

Reduce Cyber Supply Chain Risks When Integrating New Technology

By Angel Davila

When it comes to integrating the latest technological breakthroughs into supply chain management, we may consider the cost savings, systems efficiency, and profitability, rather than the risks and the need for rigorous vetting. Once in a breach crisis however, typical kneejerk reactions are often met with typical kneejerk solutions, which often become permanent until the next vulnerability is identified. Does this lack of proactivity bring the game “whack-a-mole” to mind?

The National Institute of Standards and Technology (NIST) writes in its Best Practices in Cyber Supply Chain Risk Management guidance that “cybersecurity in the supply chain cannot be viewed as an IT problem only,” and must be addressed across the enterprise. Key risks noted by NIST include third-party vendors, poor security practices by lower-tier suppliers, and compromised or counterfeit software/hardware purchased from suppliers. Every phase of technology integration is crucial and must be closely examined through a security lens. Here are ways to monitor three critical phases of supply chain technology integration – research (conception), development (manufacturing) and fielding (deployment).

Phase 1: Research (Conception)

Phase 2: Development (Manufacturing)

Phase 3: Fielding (Deployment)

NIST advises that supply chain professionals should partner with every team that touches any part of a product during its development lifecycle to ensure that cybersecurity is addressed. Assessing your technology integration process prior to a cyber event will save your organization valuable resources and prevent business interruption. 

Angel Davila is a senior cybersecurity analyst at TSC Advantage, which provides enterprise security assessments, cybersecurity consulting and managed security services to critical infrastructure and Fortune 500 companies.