Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
How to evaluate and mitigate risks to the global supply chain
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Maintain a diversified supply chain: Organizations that source from international technology suppliers need to ensure they are not overly reliant on a single vendor, single region or even a single technology. Maintaining a diversified supply chain can mitigate costly disruptions from a cyberattack or vulnerability involving a key supplier, or from disruptions tied to regulatory shifts, trade restrictions or geopolitical conflicts.”What we’re talking about here is business resiliency or, more narrowly, supply chain risk management,” says Bruce Jenkins, CISO at Black Duck. “One must identify the likelihood and impact of supplier disruption and identify the alternatives.” Security leaders should make sure to include these risks and potential impacts in their overall enterprise business impact analysis (BIA) process”, and the alternative plans for addressing them, in their business continuity plan (BCP), Jenkins recommends.Strategically sourcing from multiple suppliers and regions where possible can enable better resilience and adaptability to emerging threats or unexpected geopolitical shifts. “If you’ve got key technology partnerships with access or delivery sourced in geographies of concern it is worth cultivating alternatives that are warm,” recommends Ford at Bugcrowd. “If you’ve got regions all served or accessed through common undersea cable connections understand what disruption could look like, and how you’d address an outage or degradation of service.”

Implement robust risk assessment and monitoring: Implement a risk assessment and monitoring program for your global IT supply chain, or review”, and update where necessary”, any such program you might have in place already. Organizations with suppliers in geopolitically volatile areas should consider developing an early warning capability that combines external threat intelligence feeds, news monitoring and regional business analysis. The goal should be to anticipate potential disruptions before they impact operations. “CISOs must adopt a proactive, risk-based approach when managing suppliers, especially in regions with complex regulatory or geopolitical dynamics,” says Darren Guccione, CEO and co-founder at Keeper Security. “Understanding the risks posed by suppliers in high-risk areas is critical.”Continuous tracking and monitoring of global and regional tensions is especially crucial in regions where key suppliers operate or where critical technologies are sourced. The goal should be to understand how evolving trade policies and sanctions might affect access to security tools, updates, and services, especially when these policies target technology sectors or specific companies. One example is the US government’s 2024 ban on the use of Kaspersky’s security products in the US.”If there is a sanction event that results in your inability to leverage your supplier’s solutions, I recommend attempting to maintain open and honest communications with your supplier,” Jenkins from Black Duck says. “Your contracting and export compliance legal teams should be leveraged for this,” he notes. If sanctions or regulatory actions directly or indirectly impact your ability to maintain communications and fulfill due diligences obligations it’s best to follow the mitigation route in your BCP, he advises.

Maintain ongoing visibility over your supplier’s compliance obligations: IT suppliers, even reputable and large ones, can sometimes fall afoul of international and export control regulations. In 2023, for instance, Microsoft had to pay a fine of $3.3 million to the US Department of Commerce’s Bureau of Industry and Security (BIS) and the Department of the Treasury’s Office of Foreign Assets Control (OFAC) for allegedly selling its software to a Russian company on a US sanction list. In another incident, virtual currency exchange Kraken had to pay a fine of over $360,000 to settle US charges that the company had violated sanctions against Iran.Sometimes, non-compliance by a supplier can lead to restrictions that may impact your organization’s ability to operate globally, so it’s vital to continually monitor your supply chain to ensure ethical sourcing.Be consistent, methodical and regular with your third-party risk management (TPRM) practices. Ensure that your suppliers meet recognized security certifications such as SOC 2 Type 2 and ISO 27001, Guccione says. “Clear contractual agreements outlining cybersecurity standards and data handling protocols are essential to ensure that suppliers meet the organization’s security requirements,” he notes. Establish a strong governance framework that includes regular audits, compliance checks and continuous monitoring.At the same time, be aware of the limits of your efforts within the context of a specific geopolitical or regulatory environment, Jenkins cautions. “Understand and work within those constraints, whatever they are, and don’t waste your time pushing back unless there is indisputable business value in doing so.”. Document your efforts for audit purposes and use the outcomes of your efforts for future risk-based decision-making around procurement and business resiliency programs, Jenkins noted.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3819136/how-to-evaluate-and-mitigate-risks-to-the-global-supply-chain.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link