Training

Supply chain guide

by Mark Rowe

Most businesses have multi-tiered supply chains which are likely to be both upstream (supply) (between the organisation and its suppliers or suppliers’ suppliers) and downstream (demand) (between the organisation and its market).

Vulnerabilities in these supply chains can introduce vulnerabilities to the organisation and its assets. Those vulnerabilities can expose the organisation and its assets to risk from national security threats, principally terrorism, hostile cyber-attacks by foreign states and large scale cyber-crime.

So says the official Centre for the Protection of National Infrastructure (CPNI), which recommends that organisations should view supply chain security risk as being an extension of existing arrangements to mitigate security risk. To achieve this extension requires a supply chain security risk mitigation implementation plan which includes:

• mapping of all tiers of the upstream and downstream supply chains to the level of individual contracts.

• Risk scoring each contract to link in to the organisation’s existing security risk assessment.

• Due diligence/accreditation/assurance of suppliers (and potential suppliers) and the adoption, through contracts, of proportionate and appropriate measures to mitigate risk.

• Audit arrangements and compliance monitoring.

• Contract exit arrangements.

For the 11-page document detailing risk mitigation for the supply chain visit: http://www.cpni.gov.uk/.

Related News

  • Training

    Cyber collective

    by msecadm4921

    There is no substitute for collective responsibility and common sense in the fight against cybercrime and terrorism according to Hannah Tufts, Communications…

  • Training

    Banknote checking scheme

    by Mark Rowe

    The Bank of England has launched a Banknote Checking Scheme. Aimed at cash-handling businesses it seeks to promote banknote checking at point…

  • Training

    Cyber workforce findings

    by Mark Rowe

    The worldwide cyber-security skills gap continues to present a significant challenge, according to the IT association ISACA’s new cybersecurity workforce research. More…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing