SOA Blueprint for Supply Chain Visibility
By: IBM Software Group View more from IBM Software Group >>
Download this next:
Enterprise Labeling a Supply Chain Strategic Imperative
By: Loftware
Type: White Paper
Doing business in today's global supply chain has become a complex challenge. Labeling influences a variety of strategic business drivers including regulatory compliance, customer responsiveness, business continuity, and supply chain efficiency. Consequently, it is essential that labeling strategies evolve alongside supply chain strategies for companies to be successful.
Access this in-depth white paper to discover how to implement integrated, data-driven labeling in your supply chain management strategy.
These are also closely related to: "SOA Blueprint for Supply Chain Visibility"
-
A Computer Weekly buyer's guide to supply chain resilience
By: TechTarget ComputerWeekly.com
Type: eGuide
The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer’s guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.
-
CW APAC – July 2021: Trend Watch: Supply Chain Security
By: TechTarget ComputerWeekly.com
Type: Ezine
The pandemic has heightened the importance of the supply chain and the need to protect it from cyber crime. In this handbook, focused on cyber security in the Asia-Pacific region, Computer Weekly looks at the rise of these attacks, the challenges that come with zero-trust security, attacks on the Covid-19 vaccine supply chain and the increasing risk from nation-state actors.
Find more content like what you just read:
-
A Computer Weekly buyer's guide to post-Covid-19 supply chain management
By: TechTarget ComputerWeekly.com
Type: eGuide
The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.
-
Five stages of supply chain management
By: TechTarget ComputerWeekly.com
Type: Infographic
Supply chain management (SCM) is the optimization of a product's creation and flow from sourcing to production, logistics and delivery. Because it's such a complex undertaking, each partner must communicate and work together to create efficiencies, manage risk and adapt quickly to change. In this infographic learn about the 5 steps of SCM.
-
Supply chain management balance shifts from efficiency to resilience under Covid
By: TechTarget ComputerWeekly.com
Type: eGuide
This e-guide explores these matters, beginning with a comprehensive article that ranges over supply chain management, from a macro level through how trading platforms have been flexed to switch suppliers rapidly down to how robots have been quickly deployed to solve problems of scale.
-
The CISO's guide to supply chain security
By: TechTarget ComputerWeekly.com
Type: eGuide
Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
-
A Computer Weekly buyer's guide to supply chain security
By: TechTarget ComputerWeekly.com
Type: eGuide
Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.
-
Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.
-
Securing your software supply chain
By: TechTarget ComputerWeekly.com
Type: eGuide
Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
-
Computer Weekly – 29 September 2020: How supply chain management is changing after Covid-19
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the profound changes in supply chain management as a result of the global pandemic. We find out how digital experience platforms can help deliver an omni-channel web presence. And we look at the role of technology in cracking down on international money laundering. Read the issue now.
-
MicroScope – September 2022: The green agenda
By: MicroScope
Type: Ezine
Sustainability is now seen as a necessity for business to have on their agenda, so read about how the channel is turning green to capture customer attention. Also discover how the pandemic has changed sales forever and boosted the importance of relationships, as well as learn about how to handle currency fluctuations, rises and inflation.
-
Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.
-
CW ANZ, July 2020: Expert Advice on Security
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
-
Computer Weekly – 13 September 2022: Source responsibly: Tech sector efforts to root out forced labour are failing
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we analyse the technology industry's failure to extirpate forced labour and slavery from its supply chains. We find out how cyber security firm Okta is rebuilding customer trust after a major security incident. And we discover how Caterpillar is modernising its data management. Read the issue now.
-
Today’s new supply chains: moving from insight to action in real time
By: ParkourSC
Type: Product Overview
The journey of the products in your supply chain are often full of surprises, despite your best-laid plans. Access this solution overview to learn how you can monitor every aspect of your value chain down to the item level & develop the agility to overcome obstacles, boosting customer satisfaction & revenue with the Parkour supply
-
The state of software supply chain security 2024
By: ReversingLabs
Type: Research Content
Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.
-
Retail Demand Planning: Insights to Boost Supply Chain Resiliency
By: SAS
Type: Infographic
In this infographic, you'll discover how retailers can improve demand planning, supply chain visibility, and customer experience through analytics and technology. Read on now to learn key strategies for supply chain resiliency.
-
Australia's cybersecurity game plan
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
-
An AI-first approach to procurement
By: GEP
Type: White Paper
With its capacity to transcend the boundaries of software, the significance of AI in procurement and supply chain technology is undeniable. Download this white paper to unlock 5 difference-making capabilities of AI that make it a necessity for the future of procurement.
-
Gartner® Report: Leader's Guide to Software Supply Chain Security
By: ReversingLabs
Type: Gartner Research Report
The new Gartner report explores the three pillars of software supply chain security and how to address this critical risk. Download the report to learn how you can secure remote access and build user trust.
-
MicroScope – May 2022: Charging at SME security challenges
By: MicroScope
Type: Ezine
With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
-
Zero Trust for Supply Chain Collaboration
By: Zentera Systems Inc.
Type: Product Overview
Zero Trust security can help secure supply chain collaboration and data exchange, even with untrusted partners. Learn how Zentera's software-defined solution enables fine-grained access controls and protects against data leaks. Read the full solution brief to discover more.
-
Designing The Right supply Chain For The Growing Demand For Vaccines...
By:
Type: Talk
Full title: Designing The Right supply Chain For The Growing Demand For Vaccines For Immunisation Designing the right Supply Chain Strategy for Vaccine/Biopharma growth: Global Supply Chain have witnessed unprecedented disruption in the last 2-3 years. I intend to cover what happened and why this impact was truly unique to supply chain across industries and particularly in pharma. New challenges we see in biopharma/ vaccine supply chain going forward and what we are doing to mitigate risk and build resilience into global supply chain to ensure continuity of supply. I would also be covering innovation in supply chain and cold chain logistics space which will drive development and growth in a sustainable manner for the industry going forward. I will share few of my learnings which in my mind will be key factors in building supply chain’s of the future.
-
How Supply Chain Attacks Work - And What You Can Do to Stop Them
By:
Type: Replay
Supply chain attacks made headlines in 2022, sending shockwaves through the industry as security and business leaders scrambled to reexamine the security of their own supply chains. In this webinar, experts talk through the stages of a supply chain attack and the different types of attacks to look for. You will also learn what tools and strategies you can start using immediately to assess your own supply chain security and put defenses in place to keep your supply chain protected. During this webinar you will: Learn about where hidden supply chain vulnerabilities might be lurking in your systems. Get tactics for how to assess your current supply chain security. Find out how SBOMs can be most effectively used to shore up the software supply chain. Presented by featured speakers Jason Clark & Jeffrey Martin. Moderated by Becky Bracken.
-
Hands-on in Supply Chain Security with SLSA, CIS Benchmark and other tools
By:
Type: Replay
Software supply chain attacks are dramatically on the rise, and data shows a 300% increase year-over-year with no signs of slowing down. Everyone is talking about Supply chain attacks these days, what are they? Why is it important to be aware? How can you adapt the supply chain to my software life cycle? In this talk, we will answer these questions and provide you with an overview of the supply chain inside the software development cycle, with a focus on the current guidelines and tools about Supply Chain security like SLSA, CIS Supply chain benchmarks, OpenSSF and more.
-
The Buyer's Guide to Software Supply Chain Security
By: ReversingLabs
Type: Buyer's Guide
As organizations rely more on software, the attack surface grows. Malware, tampering, and exposed secrets in commercial and proprietary apps pose risks beyond just open-source vulnerabilities. Read this buyer's guide to learn how to secure your software supply chain.
-
Benefits of an SBOM Across the Software Supply Chain
By:
Type: Replay
Software is everywhere. And for organizations dependent on software, understanding and managing the software supply chain is vital. Changes to your software supply chain may have ripple effects for your business. How do you manage that? Join us for this Synopsys webinar to learn why a software Bill of Materials (SBOM) is an important tool in managing your software supply chain. We’ll cover: • What an SBOM is and what role it plays in the supply chain • How to efficiently manage the software supply chain • What happens when something goes wrong with a link in the chain
-
Top trends procurement & supply chain leaders should know
By: GEP
Type: Research Content
As procurement and supply chain leaders continue to navigate customer service challenges while battling macroeconomic struggles, extreme weather conditions, and geopolitical upheavals, many organizations are looking for new ways they can thrive in an uncertain world. Browse this report to learn more.
-
Assessing Supply Chains and ESG Risk
By:
Type: Talk
The Covid-19 pandemic highlighted the significance of global supply chains in delivering economic, human, and societal value. With almost 80% of trade passing through supply chains, the majority of companies’ operations are held up by external workers, information and resources. Supply chains raise a number of ESG risks - from environmental pollution, to shortages of raw material and natural resources, workforce health and safety incidents and more. However, most ratings agencies fail to measure companies’ ESG performance through the lens of their global supply chains. In Episode 14 of the ESG Innovation Hub, hear from ESG leaders about the role of finance in transforming supply chain management across industries and learn how to manage supply chain risks in your portfolio. Join this session to explore: - The importance of incorporating supply chains into ESG valuations - Understand how supply chain risks differ according to sector - Factors to consider when evaluating companies’ supply chains - Engagement strategies: understand and mitigate ESG risks in portfolio companies’ supply chains - How to educate investee companies on ESG supply chain best practices - And more Speakers for this episode are: -Melanie Larkins, Accenture -Simon Colton, SGS Solutions -Tara Holeman, Ethos Matters And our host, Georgina Mitchell of WellHouse Consulting.
-
Innovating SCRM and Resilience: Harnessing the Potential of Digital Technologies
By:
Type: Talk
Supply chain managers are being asked to better manage supply chain risk and create more resilient supply chains while maintaining efficiency. Unfortunately, traditional approaches to risk management and resilience are insufficient to address this complex issue. Many companies lack the data, tools, and insights needed to manage risk and improve resilience effectively and efficiently. Fear not - there is a game-changing solution on the horizon: the intelligent use of digital technologies! In this session, Digital Supply Chain Advisor, Fabio Tiozzo shares his expert insights on the transformative power of digital technologies in supply chain risk management and resilience. Get an overview of the digital technology stack, including both mature and emerging technologies, and discover how to leverage them to revolutionize supply chain resilience and risk management. Topics for discussion include: - What supply chain managers can do to better manage supply chain risk and improve resiliency, while maintaining supply chain efficiency. - Why embracing digital supply chain risk management and resilience is not only a necessity for survival, but an opportunity to create new value and gain a competitive advantage. - How to map out your digital adoption roadmap to ensure you are integrating the right technologies into your processes. - And more...
-
Innovating SCRM and Resilience: Harnessing the Potential of Digital Technologies
By:
Type: Talk
Supply chain managers are being asked to better manage supply chain risk and create more resilient supply chains while maintaining efficiency. Unfortunately, traditional approaches to risk management and resilience are insufficient to address this complex issue. Many companies lack the data, tools, and insights needed to manage risk and improve resilience effectively and efficiently. Fear not - there is a game-changing solution on the horizon: the intelligent use of digital technologies! In this session, Digital Supply Chain Advisor, Fabio Tiozzo shares his expert insights on the transformative power of digital technologies in supply chain risk management and resilience. Get an overview of the digital technology stack, including both mature and emerging technologies, and discover how to leverage them to revolutionize supply chain resilience and risk management. Topics for discussion include: - What supply chain managers can do to better manage supply chain risk and improve resiliency, while maintaining supply chain efficiency. - Why embracing digital supply chain risk management and resilience is not only a necessity for survival, but an opportunity to create new value and gain a competitive advantage. - How to map out your digital adoption roadmap to ensure you are integrating the right technologies into your processes. - And more...
-
CW Innovation Awards Project of the Year: StratMed
By: TechTarget ComputerWeekly.com
Type: eBook
Named Project of the Year in the Computer Weekly Innovation Awards APAC 2022, StratMed's Integer platform is facilitating data exchanges between healthcare providers and their suppliers to improve transparency in India's healthcare supply chain.
-
Supply Chain Cybersecurity: How to Mitigate Third-Party Risks?
By:
Type: Talk
With supply chain transparency and digital transformation being among the top organizational priorities, cyber-related issues have become one of the top risks to businesses. Most companies don't consider their supply chain vulnerability when thinking about cybersecurity. Yet, supply chain risks could include multiple functions across the flow of information, products and services – needing the attention of all entities involved. Supply chain security is every company's responsibility. In this webinar, we will address the key cybersecurity third-party concerns and discuss the most effective tactics for organizations to secure their supply chains and contribute to global supply chain security. We will also discuss how certification to ISO 27001 can support supply chain security, the changes to ISO 27002 controls and how these controls relate to third-party cybersecurity. We will explore: • Common issues and key principles in managing cyber risk in your supply chain • The measures organizations can take to monitor, identify, assess, and mitigate third-party risks • ISO 27002 changes and what these mean for ISO 27001 and your ISMS • What are the controls in ISO 27001 that relate to the supply chain and what do they mean for your business?
-
SOC guide to open source and the software supply chain
By:
Type: Video
Did you know that open source software accounts for upwards of 70% of new releases? Attackers sure do. In fact, the experts at Gartner predict that 45% of all organizations will experience a software supply chain attack by 2025. In this session, learn how and why leading security teams are adopting new tactics to respond to software supply chain attacks, and find a crash course for integrating software supply chain security into your SOC. Session highlights include: • Best practices for mitigating the risk of your software supply chain • What’s on the horizon for supply chain attacks (and how to prepare now) • Security “ask me anything”: Answers to top software supply chain Q’s • And more
-
Direct & indirect spend outlook for 2024: What to know
By: GEP
Type: Research Content
As it’s clear that the challenges plaguing the supply chain will not be going away any time soon, procurement must come up with ways that they can leverage new technology to combat these issues. But of these tools, which are the most effective? Browse this report to learn more.
-
Autonomous AI Agents Are The Future of Procurement and Supply Chain Operations
By: GEP
Type: White Paper
As AI agents become the future of procurement and supply chain operations, many are realizing how they can automate tasks, optimize decision-making, and enhance collaboration to boost efficiency and resilience. Read the full white paper to discover how your organization can benefit.
-
Enterprise Guide to Open-Source Security with Python, R, and Anaconda
By: Anaconda
Type: eBook
Open-source software offers many benefits, but also introduces new security risks. This guide covers best practices for managing open-source packages, dependencies, and vulnerabilities to secure your Python and R software supply chain. Access the e-book now to learn more.
-
Assess & Manage Commercial Software Risk
By: ReversingLabs
Type: White Paper
Enterprises face growing risks and regulatory demands to secure third-party software. Spectra Assure's white paper details how its binary analysis identifies threats like malware and vulnerabilities in commercial software without source code. Discover risk management strategies by reading the full paper.
-
Securing the Software Supply Chain: More Than Just an SBOM?
By:
Type: Replay
Gone are the days when you only had to worry about the code your developers are writing. Now you have to think about a complex supply chain, which includes everything from open source dependencies and APIs to containers, infrastructure-as-code, and CI/CD toolchains. Recent supply chain attacks, along with the U.S. executive order on cybersecurity, have organizations re-evaluating the security of their software supply chains. In this webinar, our expert panelists will discuss • Why securing your supply chain means more than having an accurate software Bill of Materials (SBOM) • What the executive order and other initiatives mean for software producers and consumers • What security and development teams need to do to manage new and evolving supply chain threats Learn what you can do to enhance the security of your software supply chain. Register now.
-
AI-Driven Supply Chain Management: Efficiency Reimagined
By:
Type: Talk
Supply chain management stands at the cusp of a monumental shift, powered by AI. Intricate and complex processes, often bogged down by inefficiencies, are experiencing an overhaul with the integration of AI. According to recent studies, by 2024, over 60% of global enterprises will have invested in AI-driven supply chain solutions to boost their competitive advantage. As AI technologies steadily permeate the supply chain landscape, organizations are unveiling newfound efficiencies, from accurate demand forecasting to real-time logistics optimization. These advancements not only promise reduced operational costs but also a more agile and responsive supply chain system. Join us in this session as we delve into: - The transformative potential of AI in supply chain dynamics - Real-world applications and success stories of AI-driven supply chain initiatives - Preparing for the future: Challenges and opportunities in adopting AI for supply chain management
-
Securing the Hardware Supply Chain: Insights from Intel and Enterprise Strategy Group
By:
Type: Video
IT hardware supply chain risks affect everyone from hardware system manufacturers to enterprises managing their hardware fleets. Ensuring the integrity of the hardware supply chain is essential, both to mitigate risk as well as for meeting compliance and contractual obligations. Join us in this webinar featuring Todd Thiemann, Senior Analyst at Enterprise Strategy Group and Yasir Aziz, Senior Director of Trust & Security Solutions at Intel as they discuss how your organization can secure your hardware supply chain. The session will cover: • Why supply chain risks are increasingly a cause for concern (with ESG reporting a +34% increase in research on supply chain security) • Supply chain regulations and laws around the globe, including new regulations in Japan, UK, US and the EU • Key functionalities that enterprises are looking when it comes hardware standards, including visibility, compliance and lifecycle management • What Intel is doing from a supply chain perspective to help you and your enterprise
-
Building Resilient Supply Chains: Strategies for Success
By:
Type: Talk
In today's evolving business landscape, effective supply chain management has never been more crucial for executives striving to maintain seamless operations. As organizations face unprecedented disruptions and uncertainties, reducing supply chain risk and bolstering resilience have become paramount. Gaining visibility into your supply chain is not only advantageous but imperative. Understanding complex vendor relationships is essential for identifying vulnerabilities, assessing potential disruptions, and implementing proactive measures to ensure supply chain resilience. Leveraging advanced visualization enables organizations to gain valuable insights into the dynamics of their supply chain ecosystem that enhances decision-making and enables proactive risk mitigation and response. Join GRC 20/20’s Michael Rasmussen and Archer's Sarah Kassoff for this webinar to learn: • How to enhance your organization's supply chain resilience amid increasing uncertainties • Strategies to reduce supply chain risk and ensure uninterrupted business operations • The impact and benefits of visualization in tackling complex supply chain challenges
-
Cybersecurity Innovation Showcase Ep. III: What’s Lurking in Your Supply-Chain?
By:
Type: Talk
Cybersecurity Innovation Showcase Series: In this 4-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation. Threat actors targeting your supply-chain, however small, have the potential for outsized impact to your organization. And to make matters worse, many cybersecurity practitioners have limited visibility around who or what resides within their supply-chain, and at every point along the supply-chain from development to disposal. Organizations with inadequate Supply-Chain Risk Management practices create various opportunities for malicious actors to exploit the “fog of war” in cyber defense by clouding visibility and limiting cyber defender abilities to prevent, mitigate, detect, and respond. In this webinar, Verizon Threat Research Advisory Center (VTRAC) security practitioners will share their perspectives on supply-chain risks and provide recommendations on how organizations can reduce exposure in their supply-chain. This webinar will explore: Common shortcomings of Supply-Chain Risk Management practices, controls and countermeasures Elements of a robust Supply-Chain Risk Management and effective Incident Response program Verizon solutions to reduce the supply-chain risk and detection and response when the need arises
-
Cybersecurity Innovation Showcase Ep. II: What’s Lurking in Your Supply-Chain?
By:
Type: Replay
Cybersecurity Innovation Showcase Series: In this 3-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation. Threat actors targeting your supply-chain, however small, have the potential for outsized impact to your organization. And to make matters worse, many cybersecurity practitioners have limited visibility around who or what resides within their supply-chain, and at every point along the supply-chain from development to disposal. Organizations with inadequate Supply-Chain Risk Management practices create various opportunities for malicious actors to exploit the “fog of war” in cyber defense by clouding visibility and limiting cyber defender abilities to prevent, mitigate, detect, and respond. In this webinar, Verizon Threat Research Advisory Center (VTRAC) security practitioners will share their perspectives on supply-chain risks and provide recommendations on how organizations can reduce exposure in their supply-chain. This webinar will explore: Common shortcomings of Supply-Chain Risk Management practices, controls and countermeasures Elements of a robust Supply-Chain Risk Management and effective Incident Response program Verizon solutions to reduce the supply-chain risk and detection and response when the need arises
-
Cybersecurity Innovation Showcase Ep. IV: What’s Lurking in Your Supply-Chain?
By:
Type: Replay
Cybersecurity Innovation Showcase Series: In this 4-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation. Threat actors targeting your supply-chain, however small, have the potential for outsized impact to your organization. And to make matters worse, many cybersecurity practitioners have limited visibility around who or what resides within their supply-chain, and at every point along the supply-chain from development to disposal. Organizations with inadequate Supply-Chain Risk Management practices create various opportunities for malicious actors to exploit the “fog of war” in cyber defense by clouding visibility and limiting cyber defender abilities to prevent, mitigate, detect, and respond. In this webinar, Verizon Threat Research Advisory Center (VTRAC) security practitioners will share their perspectives on supply-chain risks and provide recommendations on how organizations can reduce exposure in their supply-chain. This webinar will explore: Common shortcomings of Supply-Chain Risk Management practices, controls and countermeasures Elements of a robust Supply-Chain Risk Management and effective Incident Response program Verizon solutions to reduce the supply-chain risk and detection and response when the need arises
-
The Nuances of Physical Security and Supply Chain Management
By:
Type: Talk
When you think about it, supply chain security surfaced as an important focus in the wake of several significant events that highlighted vulnerabilities in global supply chains. These events began with the 9/11 attacks in 2001 resulting in a heightened focus on national security - including the security of supply chains. Subsequently, we had high-profile product recalls and quality issues - such as contaminated foods and counterfeit drugs - again raising concerns about supply chain security. Additionally, we also had an increasing reliance on digital systems and technology in supply chains that were made more vulnerable due to cyber threats. These events in conjunction with the rapid growth of globalization and outsourcing of manufacturing and sourcing activities to different areas of the globe increased the complexity and extended the geographic reach of supply chains. Hence, supply chain security -- including cyber and physical -- surfaced and required important focus. Join Ernie Hayden (Founder & Principal, 443 Consulting) to gain a better perspective of the physical security issues involved with the current global supply chain and get insights on how to overcome them. Key challenges discussed in the session include: - Unauthorized access to the supply chain and materials. - Inadequate surveillance of physical security of supply chain operations; and, - Transportation security weaknesses arising from inadequate packaging, lack of tracking and tracing mechanisms, or insufficient verification of drivers and personnel involved in the transportation process.
-
The Nuances of Physical Security and Supply Chain Management
By:
Type: Talk
When you think about it, supply chain security surfaced as an important focus in the wake of several significant events that highlighted vulnerabilities in global supply chains. These events began with the 9/11 attacks in 2001 resulting in a heightened focus on national security - including the security of supply chains. Subsequently, we had high-profile product recalls and quality issues - such as contaminated foods and counterfeit drugs - again raising concerns about supply chain security. Additionally, we also had an increasing reliance on digital systems and technology in supply chains that were made more vulnerable due to cyber threats. These events in conjunction with the rapid growth of globalization and outsourcing of manufacturing and sourcing activities to different areas of the globe increased the complexity and extended the geographic reach of supply chains. Hence, supply chain security -- including cyber and physical -- surfaced and required important focus. Join Ernie Hayden (Founder & Principal, 443 Consulting) to gain a better perspective of the physical security issues involved with the current global supply chain and get insights on how to overcome them. Key challenges discussed in the session include: - Unauthorized access to the supply chain and materials. - Inadequate surveillance of physical security of supply chain operations; and, - Transportation security weaknesses arising from inadequate packaging, lack of tracking and tracing mechanisms, or insufficient verification of drivers and personnel involved in the transportation process.
-
Technology for Supply Chain Disruption Rebound
By:
Type: Talk
Covid-19 has had a range of impacts on the supply chain, including on logistics, inventory, technology infrastructure, and other operational aspects. While many U.S. companies are dealing with supply chain challenges now, “they need to prepare for the recovery that will surely arrive in the not-too-distant future,” notes Professor David Simchi-Levi, in a recent MIT Sloan Management Review article. Join us on May 19 at 2 p.m. ET for “Technology for Supply Chain Disruption Rebound,” a webinar from Comcast Business. Our panelists will discuss the ways in which supply chains must change to meet reshaped demand; the need for total transparency in staying ahead of supply chain issues; logistics and inventory technologies geared to disruption; how the right infrastructure and network support these technologies; shifts in supply chain positioning and technology for the long term; and more. Our panelists: • Randy V. Bradley, Associate Professor of Information Systems and Supply Chain Management in the Haslam College of Business at The University of Tennessee. As a supply chain and IT strategist and researcher, Bradley’s expertise includes digital business transformation, supply chain digitalization, and the strategic application of business analytics and IT in the supply chain. • Simon Ellis, Program Vice President, IDC. Simon leads the Supply Chain Strategies practices at IDC Manufacturing Insights, one of IDC’s industry research companies that addresses the current market gap by providing fact-based research and analysis on best practices and the use of information technology to assist clients in improving their capabilities in critical process areas.
-
Secure from the core: Applying key security lessons to software supply chains
By:
Type: Video
Software supply chain attacks are on the rise. In this session, we’ll explore the most common types of software supply chain attacks and provide an overview of the risks they pose to businesses. We’ll also discuss best practices for securing your software supply chain, such as implementing risk assessment and management processes, establishing strong security controls, and building a culture of supply chain security.