SlideShare a Scribd company logo
1 of 24
Download to read offline
Scared About Supply Chain
Cybersecurity? 5 Reasons
You Aren't Scared Enough
Join The Conversation
On Twitter
@XENETA_AS
About
Xeneta
Container Freight Pricing
Transparency With One Platform In
Real Time & On Demand.
Are You Paying The
Right Container Freight
Rates?
Discover Savings
Potential In Real
Time.
Contact Us.
Many organizations and
supply chain experts are
concerned about cyber
security. The risks stemming
from supply chain cyber
threats are real. In fact, the
danger is more frightening
and potentially harmful than
we realize. Here’s why.
Assessing Cyber Supply Chain
Security Vulnerabilities
Experts on cybersecurity and
supply chain management (SCM)
like to draw attention to the fact
that operating systems are only as
strong as their “weakest link.” The
“weakest link” argument is evoked
with good reason when discussing
risk management.
39% of the respondents indicated
they use both electronic and
paper invoicing while 38% noted
electronic and 23% reported they
use paper invoicing.
Not to overstate it, but there’s a lot of
truth to the idea that networked
models of security ‘are only as strong
as the weakest link.
- Forbes
Not to overstate it, but there’s a lot of
truth to the idea that networked
models of security ‘are only as strong
as the weakest link.
- Forbes
And because big business will continue
to outsource and pursue new markets
of customers and supply, the scope of
the problem is exploding.
- Forbes
In almost every industry, companies are more dependent
than ever upon suppliers, intermediaries, third-party service
providers and vendors in the supply chain network.
The role and risk of vendors in
security lapses in the supply
chain were further highlighted
by the recent data breach at
Verizon, the US’s largest
wireless communications
carrier.
Verizon had been employing Israeli-based telephonic software
and data firm, NICE Systems to carry out customer service
analytics.
The incident was discovered in late June 2017. An employee from
NICE Systems had left the data of millions of customers exposed
on an unsecured Amazon server for the previous six months.
Both buyer and vendor face potential disaster in the supply chain
ecosystem. A weighty burden has been placed on buyers to
ensure extreme thresholds of security from all vendor partners. In
turn, vendors are at constant risk of legal liability from customers
should a security problem be traceable to them.
Learn How Xeneta Can Help
You Get Insight And Intelligence Into
Your Global Ocean Freight Prices And
Change Your Logistics Business:
Request
Demo Now
Assessing Cybersecurity
Risks in the Supply Chain
Today, common criminals, organized
crime rings, and nation-states leverage
sophisticated techniques to launch
attacks that are highly targeted and
very difficult to detect,
- Forbes
Staying ahead of threats
– like the WannaCry or
WannaCrypt
ransomware attack and
the rapidly-moving
“Petya” is challenging.
“WannaCry” has affected
over 230,000 computers
in over 150 countries –
with the most damage
inflicted on the British
National Health Service,
Spanish phone company
Telefónica and German
state railways.
Also, while somewhat
mitigated by employee
training, it is not always
possible to ward off insider
events – those resulting
from employee
vulnerabilities. Insider
events can include the
phenomenon of social
engineering. There is also
the casual use of devices
by employees and the
mishandling of information
by workers who are not
adhering to best practices
(PWC, US Cybercrime).
Cyber Complexity
Cyberspace operates according to
different rules than the physical world. I
don’t mean the social ‘rules’ but rather
the physics and math of cyberspace.
The nodal nature of a light-speed
network means that concepts like
distance, borders, and proximity all
operate differently, which has profound
implications for security.
- Michael Daniel
Not so in cyberspace.
Organizations and institutions are
touching upon tricky new frontiers
legally and policy-wise, such as the
proper division of responsibility
between governments and the
private enterprise to protect.
Defense against risks needs
significant investment to keep up
with the threats.
Combating Cyber Risks in the
Supply Chain: Greater Need to
Act
Many companies are not devoting the necessary amount of
investment to cybsersecurity.
Alex Bau believes it comes down to behavioral economics .There
are certainly daunting cost considerations. Worldwide spending
on cybersecurity is set to exceed $1 trillion between 2017 to
2021 --with many companies not being able to keep pace.
There is also hope. Blockchain solutions, banding together to pool
cybersecurity efforts, smart sensors (Marianne Mannschreck,
“How Smart Sensors and the IoT will Evolve Supply
Chains,”ITProPortal, further training…these are all possible
avenues for a better future, one in which (it is hoped) there will be
less reason for fear.

More Related Content

What's hot

What's hot (20)

The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: Netherlands
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 
Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for Smartgrid
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Cyber Warfare
Cyber WarfareCyber Warfare
Cyber Warfare
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 

Similar to Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 

Similar to Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough (20)

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
TME0212-49
TME0212-49TME0212-49
TME0212-49
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 

More from Xeneta

More from Xeneta (20)

CY/CY Term and its Relation to Ocean Freight Costing
CY/CY Term and its Relation to Ocean Freight CostingCY/CY Term and its Relation to Ocean Freight Costing
CY/CY Term and its Relation to Ocean Freight Costing
 
4 Tips on How to Overcome Challenges Related to Procurement of Ocean Shipping...
4 Tips on How to Overcome Challenges Related to Procurement of Ocean Shipping...4 Tips on How to Overcome Challenges Related to Procurement of Ocean Shipping...
4 Tips on How to Overcome Challenges Related to Procurement of Ocean Shipping...
 
Play Nice: What is the Cost of Poor Supplier Relationships?
Play Nice: What is the Cost of Poor Supplier Relationships?Play Nice: What is the Cost of Poor Supplier Relationships?
Play Nice: What is the Cost of Poor Supplier Relationships?
 
FAK Developments Suggest Further Value From Long-Term Contracts
FAK Developments Suggest Further Value From Long-Term ContractsFAK Developments Suggest Further Value From Long-Term Contracts
FAK Developments Suggest Further Value From Long-Term Contracts
 
How Chinese New Year 2018 Affected Container Rates (Historical Comparison)
How Chinese New Year 2018 Affected Container Rates (Historical Comparison)How Chinese New Year 2018 Affected Container Rates (Historical Comparison)
How Chinese New Year 2018 Affected Container Rates (Historical Comparison)
 
Will I Leave Money on the Table with 12-month Fixed Rates?
Will I Leave Money on the Table with 12-month Fixed Rates?Will I Leave Money on the Table with 12-month Fixed Rates?
Will I Leave Money on the Table with 12-month Fixed Rates?
 
When is the Best Time to Negotiate Ocean Freight Rates?
When is the Best Time to Negotiate Ocean Freight Rates?When is the Best Time to Negotiate Ocean Freight Rates?
When is the Best Time to Negotiate Ocean Freight Rates?
 
Why Port-to-Port Rates Really Matter
Why Port-to-Port Rates Really MatterWhy Port-to-Port Rates Really Matter
Why Port-to-Port Rates Really Matter
 
The Power of Data: Understanding Supply Chain Analytics
The Power of Data: Understanding Supply Chain AnalyticsThe Power of Data: Understanding Supply Chain Analytics
The Power of Data: Understanding Supply Chain Analytics
 
Will Low Sulfur Shipping Fuel Costs Increase Shipping Rates?
Will Low Sulfur Shipping Fuel Costs Increase Shipping Rates?Will Low Sulfur Shipping Fuel Costs Increase Shipping Rates?
Will Low Sulfur Shipping Fuel Costs Increase Shipping Rates?
 
The US East Coast: Open for Mega Business
The US East Coast: Open for Mega BusinessThe US East Coast: Open for Mega Business
The US East Coast: Open for Mega Business
 
A Split Peak Season?
A Split Peak Season?A Split Peak Season?
A Split Peak Season?
 
Why Digitalization is Raising the Bar for Transportation Procurement
Why Digitalization is Raising the Bar for Transportation ProcurementWhy Digitalization is Raising the Bar for Transportation Procurement
Why Digitalization is Raising the Bar for Transportation Procurement
 
The Process Of Benchmarking Supply Chain & Ocean Freight Rates
The Process Of Benchmarking Supply Chain & Ocean Freight RatesThe Process Of Benchmarking Supply Chain & Ocean Freight Rates
The Process Of Benchmarking Supply Chain & Ocean Freight Rates
 
The Reach of Intelligent Freight Technologies
The Reach of Intelligent Freight TechnologiesThe Reach of Intelligent Freight Technologies
The Reach of Intelligent Freight Technologies
 
What Is ENS and Why Is There an ENS Charge?
What Is ENS and Why Is There an ENS Charge?What Is ENS and Why Is There an ENS Charge?
What Is ENS and Why Is There an ENS Charge?
 
The Importance Of Freight Cost Benchmarking
The Importance Of Freight Cost BenchmarkingThe Importance Of Freight Cost Benchmarking
The Importance Of Freight Cost Benchmarking
 
Fixing the Ocean Freight Market Overcapacity Issue – Is it Done Yet?
Fixing the Ocean Freight Market Overcapacity Issue – Is it Done Yet?Fixing the Ocean Freight Market Overcapacity Issue – Is it Done Yet?
Fixing the Ocean Freight Market Overcapacity Issue – Is it Done Yet?
 
Globalization Picks Up Pace as Shipping and Logistics Market Recovers
Globalization Picks Up Pace as Shipping and Logistics Market RecoversGlobalization Picks Up Pace as Shipping and Logistics Market Recovers
Globalization Picks Up Pace as Shipping and Logistics Market Recovers
 
What are ISPS Charges
What are ISPS ChargesWhat are ISPS Charges
What are ISPS Charges
 

Recently uploaded

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 

Recently uploaded (20)

Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 

Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough

  • 1. Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
  • 2. Join The Conversation On Twitter @XENETA_AS
  • 3. About Xeneta Container Freight Pricing Transparency With One Platform In Real Time & On Demand.
  • 4. Are You Paying The Right Container Freight Rates? Discover Savings Potential In Real Time. Contact Us.
  • 5. Many organizations and supply chain experts are concerned about cyber security. The risks stemming from supply chain cyber threats are real. In fact, the danger is more frightening and potentially harmful than we realize. Here’s why.
  • 6. Assessing Cyber Supply Chain Security Vulnerabilities
  • 7. Experts on cybersecurity and supply chain management (SCM) like to draw attention to the fact that operating systems are only as strong as their “weakest link.” The “weakest link” argument is evoked with good reason when discussing risk management.
  • 8. 39% of the respondents indicated they use both electronic and paper invoicing while 38% noted electronic and 23% reported they use paper invoicing.
  • 9. Not to overstate it, but there’s a lot of truth to the idea that networked models of security ‘are only as strong as the weakest link. - Forbes
  • 10. Not to overstate it, but there’s a lot of truth to the idea that networked models of security ‘are only as strong as the weakest link. - Forbes
  • 11. And because big business will continue to outsource and pursue new markets of customers and supply, the scope of the problem is exploding. - Forbes
  • 12. In almost every industry, companies are more dependent than ever upon suppliers, intermediaries, third-party service providers and vendors in the supply chain network.
  • 13. The role and risk of vendors in security lapses in the supply chain were further highlighted by the recent data breach at Verizon, the US’s largest wireless communications carrier.
  • 14. Verizon had been employing Israeli-based telephonic software and data firm, NICE Systems to carry out customer service analytics. The incident was discovered in late June 2017. An employee from NICE Systems had left the data of millions of customers exposed on an unsecured Amazon server for the previous six months. Both buyer and vendor face potential disaster in the supply chain ecosystem. A weighty burden has been placed on buyers to ensure extreme thresholds of security from all vendor partners. In turn, vendors are at constant risk of legal liability from customers should a security problem be traceable to them.
  • 15. Learn How Xeneta Can Help You Get Insight And Intelligence Into Your Global Ocean Freight Prices And Change Your Logistics Business: Request Demo Now
  • 17. Today, common criminals, organized crime rings, and nation-states leverage sophisticated techniques to launch attacks that are highly targeted and very difficult to detect, - Forbes
  • 18. Staying ahead of threats – like the WannaCry or WannaCrypt ransomware attack and the rapidly-moving “Petya” is challenging. “WannaCry” has affected over 230,000 computers in over 150 countries – with the most damage inflicted on the British National Health Service, Spanish phone company Telefónica and German state railways.
  • 19. Also, while somewhat mitigated by employee training, it is not always possible to ward off insider events – those resulting from employee vulnerabilities. Insider events can include the phenomenon of social engineering. There is also the casual use of devices by employees and the mishandling of information by workers who are not adhering to best practices (PWC, US Cybercrime).
  • 21. Cyberspace operates according to different rules than the physical world. I don’t mean the social ‘rules’ but rather the physics and math of cyberspace. The nodal nature of a light-speed network means that concepts like distance, borders, and proximity all operate differently, which has profound implications for security. - Michael Daniel
  • 22. Not so in cyberspace. Organizations and institutions are touching upon tricky new frontiers legally and policy-wise, such as the proper division of responsibility between governments and the private enterprise to protect. Defense against risks needs significant investment to keep up with the threats.
  • 23. Combating Cyber Risks in the Supply Chain: Greater Need to Act
  • 24. Many companies are not devoting the necessary amount of investment to cybsersecurity. Alex Bau believes it comes down to behavioral economics .There are certainly daunting cost considerations. Worldwide spending on cybersecurity is set to exceed $1 trillion between 2017 to 2021 --with many companies not being able to keep pace. There is also hope. Blockchain solutions, banding together to pool cybersecurity efforts, smart sensors (Marianne Mannschreck, “How Smart Sensors and the IoT will Evolve Supply Chains,”ITProPortal, further training…these are all possible avenues for a better future, one in which (it is hoped) there will be less reason for fear.