Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Slideshows

04:15 PM
Curtis Franklin Jr.
Curtis Franklin Jr.
Edge Slideshows

8 Supply Chain Security Requirements

Complex supply chains have complex security requirements, but secure them you must. Here's where to start.
1 of 10

It seems impossible to overstate the importance of the supply chain, especially in times like these. Millions of consumers, too, learned distressing lessons when stories of crops rotting in fields and images of empty grocery shelves collided. 

One glaring realization: Many supply chains are not just complex, they're brittle – hardened against certain risks, but vulnerable to shocks from other sources. That statement is true for the physical components of a supply chain as well as the supply chain data that IT security professionals are charged with protecting.

Dark Reading turned to a number of security professionals about what it takes to secure a supply chain. Their answers ran the gamut from the obvious to the subtle, the strategic to the operational. But all recognized one critical fact: "Supply chain risks are complex," says Chris Morales, head of security analytics at Vectra. And managing those risks is no simpler.

The points we present here are intended to help you protect your supply chain from multiple risks – not just the most obvious. And they tend to look at data that flows through an organization's supply chain from many directions, not simply upstream.

How has your supply chain fared in 2020? Have your plans for supply chain resilience panned out, or have there been lessons learned from a shock to the system? Leave a comment, below, to share your lessons or triumphs from these extraordinary times.

(Image: momius VIA Adobe Stock)


Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ...
View Full Bio

1 of 10

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
5/18/2020 | 9:44:24 AM
We can't forget the Country/Manufacturer of Origin
To often with regards to IoT devices it's easy to overlook who the real manufactuer of the device is. Especially when you see a trusted name silkscreened on the front. Understanding who really makes the underlying tech and accompanying os/application is a must, especially if these devices are being deployed in critical infrastructure, DOD or State/Fed networks. 
Building Cybersecurity Strategies in Sub-Saharan Africa

Filmed for Dark Reading News Desk at Black Hat Virtual.

LAURA TICH: We have that imbalance, where the big organizations are more protected, where the smaller ones -- which are the most common businesses in the region -- they are least protected... Sometimes they do get the tools, they do get the funding to buy some critical tools, but there's a lack of skills to handle or people who understand how to work those tools. So there are a lot of factors that contribute to our growth -- or lack thereof -- in the cybersecurity industry.


Name That Toon: Tough Times, Tough Measures
Latest Comment: Wear a mask, please!
Flash Poll