SlideShare a Scribd company logo
1 of 43
WHO CARES?
SUPPLY CHAIN MANAGERS’ PERCEPTIONS REGARDING
CYBER SUPPLY CHAIN RISK MANAGEMENT
IN THE DIGITAL TRANSFORMATION ERA
109578401 HOANG TO NHU
109578403 DO THI TRANG
109678402 NGUYEN THI HONG NHUNG
Perceptions of supply chain managers for cyber supply chain risk management (CSCRM)
How can organizations deploy a CSCRM strategy?
ABSTRACT
Digital transformation
Cyber supply chain
Cyber security
1. INTRODUCTION
1. INTRODUCTION
CYBER SECURITY
CYBER RISKS COMPANIES CSCRM
in a supply chain are
seen as the top threats
tend to adopt security
measures to protect
themselves
is necessary for a better
level of resilience
through the cyber supply
chain
ORGANIZATIONS LITERATURE
involved in a supply chain
do not make the same
decisions
gives technical aspects
rather than organization
aspects across the
supply chain
as top threats
THIS RESEARCH
helps organizations to understand how they can deploy a
cyber security strategy
RQ1.
How relevant are the elements of CSCRM perceived by
companies in a supply chain?
RQ2.
How aligned are the perceptions about CSCRM of companies
in a supply chain?
Manufacturers Logistics Providers Retailers
Survey of the perceptions of supply chain managers regarding 3 main stages:
Section 2: Overview of the literature of CSCRM
Section 3: Research methodology
Section 4: Investigation results
Section 5: Findings of the analysis
Section 6: Conclusion
2. THEORETICAL BACKGROUND
Cyber supply chain
risk management
(CSCRM)
CSCRM
PURPOSE
is to extend control on cyber risks which enables a
continuously adaptive capacity.
Supply chain resilience
relates to a fit between riskiness and related level of
preparedness to manage the risks.
Humans
are limited to make objective estimations.
INDIVIDUALS
seem to rely on their perception of risks on their own
confidence and belief.
Decisions
are subjective for what might happen and how they think
it might affect.
Different approaches
by different people make different effects.
Cyber risks
Sources of risks
Responsibility and ownership of the CSCRM
Information exchanged
Countermeasures to manage cyber risks.
CSCRM process includes
Initiatives and
countermeasures to
manage cyber risks
Sources of cyber risks
Cyber risks
in supply chain
Responsibility
of CSCRM process
34%
25%
34%
2%
ELEMENTS OF CSCRM PROCESS
Information exchanged
in the supply chain 5%
2.1 CYBER RISKS in supply chain
• Type 1 includes incidents of phishing and theft or data manipulation.
• Type 2 covers cyberstalking and harassment, stock market manipulation, blackmailing and corporate espionage.
BACKBONE RISKS
• ERP system malfunction
• Crash of company’s website
• Lack of network connectivity
• Malware
• Data breach
• Damage of records
• Theft of credentials
2.2 SOURCES of cyber risks
INTERNAL EXTERNAL
MALICIOUS
NON-INTENTIONAL
Suppliers/contractors
Current
employees
Former
employees
Suppliers/
contractors
Customers
Competitors
Hackers/
Hacktivists
Current employees
Former employees
Technical problems
Customers
Natural disasters
Technical problems
Colicchia (2019)
2.2 SOURCES of cyber risks
• Employees
• Physical objects
• Technical assets
Ghade (2020)
2.3 RESPONSIBILITY AND OWNERSHIP
of CSCRM process
• Entire company should
engage in the CSCRM
process with strong
commitment.
• Cyber security should be a
department in the company.
2.4 INFORMATION EXCHANGED
in the supply chain
Inventory Sales data Invoices Discounts
Order status Production plan Performance Master data
2.5 INITIATIVES AND COUNTERMEASURES
to manage cyber risks
Pre-attack
Actions at the technical
level and those directed
at or carried out by
human factors
Trans-attack
Data consistency checks
and task forces
Post-attack
Forensics, incident
documentation,
insurance and recovery
and backup procedures
Companies seem to respond with pre-attacker phase rather than the others.
However, all phases should have a varied set of actions to cover different attacks and
different risk environments.
3. METHOD
3.1 SAMPLE
Focus on a specific sector, specifically the FMCG
industry in Italy
The Italian FMCG industry is placed among the top four
markets in Europe for logistics flows and generated
turnover, and it is one of the fastest-growing sectors
across Europe, after Spain in 2016
The Italian FMCG supply chain has gone through a deep
transformation, leading to the adoption of the principles
of efficient consumer response (ECR) and IT
technologies
3.1 SAMPLE AND DATABASE
The questionnaire was distributed to 524 companies,
with the following representation: 321 manufacturers,
134 logistics service providers and 69 retailers.
Managers in charge of supply chain management or logistics
are chosen as potential respondents for this survey (with
minimum 5 years experience)
112 full questionnaires returned.
3.1 DESIGN
The resulting questionnaire consisted of six different sections
The questions were measured by five-point Likert scales, ranging from “very relevant” to “not relevant”,
from “low impact” to “very high impact” (according to the assessment scale presented by Hallikas et al.,
2004) or from “very low probability” to “very high probability” (according to the assessment scale
presented by Hallikas et al., 2004)
Use ANOVA with F statistics value with a significance level of 5% to analyse the results.
4. RESULTS
4.3. Perception of the sources
of risk
4.2. Perception of the risk
events
4.1. Profile of the
respondents’ sample
4.4. Involvement of the
organization’s departments in
cyber and information risk
management
4.5. Perception of the criticality
of the information shared
across the supply chain
4.6. Perception of the
countermeasures and actions for
mitigating cyber risks
4.1 PROFILE of the respondents’ sample
64 manufacturers
31 logistics service
providers 17 retailers
4.2 PERCEPTION of the risk events
the whole FMCG supply chain has experienced
the same risk events
an almost unanimous consensus around the
two events considered to be the most
dangerous ones
Malware has been judged to be a high risk,
especially by retailers
4.3 PERCEPTION of the risk events
The Bubble diagram reports the mean values of the three variables for each assessed risk event: impact
(vertical axis), probability (horizontal axis) and occurrence (bubble diameter, i.e. the larger the bubble
diameter, the more recently the risk event has occurred)
Show the occurrence affects the perception of the level of riskness of the evaluated events, especially in
terms of impact
4.4.PERCEPTION of the sources of risk
Retailers have a generally weaker perception of the sources of cyber and information risks in their supply chain
Hackers are seen as the most dangerous source of risk, ranking first in all groups of respondents
The “human factor” and the “enemy within” are common threats to all categories of organizations in the FMCG
supply chain
Logistics Service Providers seem to perceive technical reasons as one of the main causes of risks for their business
continuity
4.4 INVOLVEMENT of the organization’s department in
cyber and information risk management
Most involved
4.5 PERCEPTION of the criticality of the information shared
across the supply chain
Manufacturer on the master data and invoicing side along with data about their sales
Retailers on the discounts and promotional data along with inventory
Logistics Service Providers on transport data
4.6 PERCEPTION of the countermeasures andactions for
mitigating cyber risks
Level of perception regarding the
initiatives and countermeasures for
managing cyber risks
IT technical side is still dominant in
every stage of the FMCG supply chain
No unanimous consensus regarding
some technical measures
The perceptions
of risk events
5.1
The sources of
risk
5.2
The ownership
of the CSCRM
process
5.3 5.4
The
countermeasures
to mitigating
cyber risks
5. DISCUSSION
5.1. THE PERCEPTION of risk events
Logistics Service Providers have a broader perception of the risk events compared to
Manufacturers and Retailers
• Those risks with higher occurrence are perceived more vividly compared
to other risk with lower values of occurrence
• Little awareness leads to underestimating the importance of risk events
(and the other way around)
5.1. THE PERCEPTION of risk events
5.2. THE SOURCE of risk
• The so-called “human factor” is seen as one of the predominant threats to
cyber security in supply chains and this is in line with previous literature
(Ghadge et al., 2020).
• Logistics Service Providers are more concerned about technical problems
that could undermine the continuity of their business operations
5.3. THE OWNERSHIP of the CRM process
• The medium-high scores assigned to the majority of the business
departments
• The human resources department is at the bottom of the list and this
shows a contradiction in terms of approach to the “human factor” in the
CSCRM process
5.4.THE COUNTERMEASURE to mitigating cyber risks
Table 9 reports an
overall high level of
relevance assigned to
the set of initiatives
but a medium level of
alignment of the
respondents’
perceptions related to
them.
Overall, a certain level of alignment of the perception about the elements composing the CSCRM
process among the various actors of the FMCG supply chain exists. In this case, it appears that
Manufacturers and Retailers are more focused on their domain rather than on the supply chain. On
the contrary, it seems that Logistics Service Providers can overcome this limitation and have a
broader perception of the risks, sources of risks and criticality of information and data exchanged
that span across the different stages of the supply chain.
DISCUSSION
6 .1. Theoretical implications
This study provides the scientific community with a vertical analysis of a
supply chain, something that extends the existing theory on CSCRM
It also contributes to extending the current theory with the proposal of
a paradigm that highlights the role of Logistics Service Providers as
“orchestrators” of the CSCRM process.
6. CONCLUSIONS
6 .2. Practical implications
This study provides the industrial community with thought-provoking
insights on the misalignment between the perceived relevance of the human
factor as a source of risk (high) and the perceived importance of
countermeasures to mitigate the risk events stemming from that source
(low)
This study could help organizations devise procedures and policies to report
incidents and create common and shared knowledge about risks that could
help them assess the level of risk in their supply chains more closely
01. 解決甚麼問題 ?
02. 為什麼這個問題很重要 ?
03. 提出的論點或假說是甚麼 ?
6 .2. Practical implications
04. 如何證明他們論點與假說為真 ?
05. 實證研究與結果
06. 學術貢獻與實務貢獻
THANKS FOR LISTENING!

More Related Content

What's hot

PPT -Lean Supply Chain Presentation
PPT -Lean Supply Chain PresentationPPT -Lean Supply Chain Presentation
PPT -Lean Supply Chain PresentationIke. M Nwamuo, MSQA
 
Trial exam questions+answers logistics and supply chain management 2
Trial exam questions+answers logistics and supply chain management 2Trial exam questions+answers logistics and supply chain management 2
Trial exam questions+answers logistics and supply chain management 2Khaoula Marai
 
Strategic supply chain management and logistics
Strategic supply chain management and logisticsStrategic supply chain management and logistics
Strategic supply chain management and logisticsBhavi Bhatia
 
Supply chain managements
Supply chain managementsSupply chain managements
Supply chain managementsSarwat Shabbir
 
Seminar Report on Supply Chain Management
Seminar Report on Supply Chain ManagementSeminar Report on Supply Chain Management
Seminar Report on Supply Chain ManagementAnkur Mehta
 
Logistics and supply chain management in the hotel industry impa
Logistics and supply chain management in the hotel industry  impaLogistics and supply chain management in the hotel industry  impa
Logistics and supply chain management in the hotel industry impahoannguyen
 
Trends in Supply Chain Management - Presentation by GRA Supply Chain Consultants
Trends in Supply Chain Management - Presentation by GRA Supply Chain ConsultantsTrends in Supply Chain Management - Presentation by GRA Supply Chain Consultants
Trends in Supply Chain Management - Presentation by GRA Supply Chain ConsultantsRebecca Manjra
 
MIS 14 Supply Chain Management
MIS 14 Supply Chain ManagementMIS 14 Supply Chain Management
MIS 14 Supply Chain ManagementTushar B Kute
 
Supply chain management practice by Spining Industry.
Supply chain management practice by Spining Industry.Supply chain management practice by Spining Industry.
Supply chain management practice by Spining Industry.Monir Uz Zaman
 
Emerging trends in supply chain management
Emerging trends in supply chain managementEmerging trends in supply chain management
Emerging trends in supply chain managementeSAT Publishing House
 
Supply chain in Pakistan
Supply chain in PakistanSupply chain in Pakistan
Supply chain in PakistanMuneeb Ahmed
 
Introduction to supply chain management (scm)
Introduction to supply chain management (scm)Introduction to supply chain management (scm)
Introduction to supply chain management (scm)Catherine Royer-Hoyez
 
IT in supply chains
IT in supply chainsIT in supply chains
IT in supply chainsiskandaruz
 

What's hot (20)

PPT -Lean Supply Chain Presentation
PPT -Lean Supply Chain PresentationPPT -Lean Supply Chain Presentation
PPT -Lean Supply Chain Presentation
 
Trial exam questions+answers logistics and supply chain management 2
Trial exam questions+answers logistics and supply chain management 2Trial exam questions+answers logistics and supply chain management 2
Trial exam questions+answers logistics and supply chain management 2
 
Strategic supply chain management and logistics
Strategic supply chain management and logisticsStrategic supply chain management and logistics
Strategic supply chain management and logistics
 
Supply chain managements
Supply chain managementsSupply chain managements
Supply chain managements
 
Seminar Report on Supply Chain Management
Seminar Report on Supply Chain ManagementSeminar Report on Supply Chain Management
Seminar Report on Supply Chain Management
 
Logistics and supply chain management in the hotel industry impa
Logistics and supply chain management in the hotel industry  impaLogistics and supply chain management in the hotel industry  impa
Logistics and supply chain management in the hotel industry impa
 
Supply chain management
Supply chain managementSupply chain management
Supply chain management
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Demand chain management
Demand chain managementDemand chain management
Demand chain management
 
Trends in Supply Chain Management - Presentation by GRA Supply Chain Consultants
Trends in Supply Chain Management - Presentation by GRA Supply Chain ConsultantsTrends in Supply Chain Management - Presentation by GRA Supply Chain Consultants
Trends in Supply Chain Management - Presentation by GRA Supply Chain Consultants
 
MIS 14 Supply Chain Management
MIS 14 Supply Chain ManagementMIS 14 Supply Chain Management
MIS 14 Supply Chain Management
 
Supply chain management practice by Spining Industry.
Supply chain management practice by Spining Industry.Supply chain management practice by Spining Industry.
Supply chain management practice by Spining Industry.
 
Srm Presentation
Srm PresentationSrm Presentation
Srm Presentation
 
Emerging trends in supply chain management
Emerging trends in supply chain managementEmerging trends in supply chain management
Emerging trends in supply chain management
 
Supply Chain Management & new trends
Supply Chain Management & new trendsSupply Chain Management & new trends
Supply Chain Management & new trends
 
Supply chain in Pakistan
Supply chain in PakistanSupply chain in Pakistan
Supply chain in Pakistan
 
Introduction to supply chain management (scm)
Introduction to supply chain management (scm)Introduction to supply chain management (scm)
Introduction to supply chain management (scm)
 
Supply Chain Management_Presentation
Supply Chain Management_PresentationSupply Chain Management_Presentation
Supply Chain Management_Presentation
 
IT in supply chains
IT in supply chainsIT in supply chains
IT in supply chains
 
SCM & CRM & ERP
SCM & CRM & ERPSCM & CRM & ERP
SCM & CRM & ERP
 

Similar to Ppt cscrm (1)

SupplyChainRiskAreas
SupplyChainRiskAreasSupplyChainRiskAreas
SupplyChainRiskAreasJeremy Castle
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperNIIT Technologies
 
ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019Amy Lauder
 
Effective Solutions for Your Supply Chain Risks
Effective Solutions for Your Supply Chain RisksEffective Solutions for Your Supply Chain Risks
Effective Solutions for Your Supply Chain RisksHalo BI
 
Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Ollie Whitehouse
 
SCL Event - Louis Ferretti - IBM - Project Executive, Product Environmental ...
SCL Event -  Louis Ferretti - IBM - Project Executive, Product Environmental ...SCL Event -  Louis Ferretti - IBM - Project Executive, Product Environmental ...
SCL Event - Louis Ferretti - IBM - Project Executive, Product Environmental ...Global Business Intel
 
Supply Chain optimization & risks factors
Supply Chain optimization & risks factorsSupply Chain optimization & risks factors
Supply Chain optimization & risks factorsAlok Anand
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperMarc St-Pierre
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
FMEA - Achieve Operational Excellence.pdf
FMEA - Achieve Operational Excellence.pdfFMEA - Achieve Operational Excellence.pdf
FMEA - Achieve Operational Excellence.pdfHamza Arif
 
Mitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainMitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainKyrl Erickson
 
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...Global Business Intel
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
 
Preventing and Managing Supply Chain Disruptions
Preventing and Managing Supply Chain DisruptionsPreventing and Managing Supply Chain Disruptions
Preventing and Managing Supply Chain DisruptionsThomas Tanel
 
Cybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdfCybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdfDaveNjoga1
 

Similar to Ppt cscrm (1) (20)

SupplyChainRiskAreas
SupplyChainRiskAreasSupplyChainRiskAreas
SupplyChainRiskAreas
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - Whitepaper
 
ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019
 
Supply Chain Mgmt Risks
Supply Chain Mgmt Risks Supply Chain Mgmt Risks
Supply Chain Mgmt Risks
 
Effective Solutions for Your Supply Chain Risks
Effective Solutions for Your Supply Chain RisksEffective Solutions for Your Supply Chain Risks
Effective Solutions for Your Supply Chain Risks
 
Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...
 
SCL Event - Louis Ferretti - IBM - Project Executive, Product Environmental ...
SCL Event -  Louis Ferretti - IBM - Project Executive, Product Environmental ...SCL Event -  Louis Ferretti - IBM - Project Executive, Product Environmental ...
SCL Event - Louis Ferretti - IBM - Project Executive, Product Environmental ...
 
Supply Chain optimization & risks factors
Supply Chain optimization & risks factorsSupply Chain optimization & risks factors
Supply Chain optimization & risks factors
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
Supply chain predictability - English.pdf
Supply chain predictability - English.pdfSupply chain predictability - English.pdf
Supply chain predictability - English.pdf
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
FMEA - Achieve Operational Excellence.pdf
FMEA - Achieve Operational Excellence.pdfFMEA - Achieve Operational Excellence.pdf
FMEA - Achieve Operational Excellence.pdf
 
Mitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply ChainMitigating the Risk of Counterfeit ICT in the DoD Supply Chain
Mitigating the Risk of Counterfeit ICT in the DoD Supply Chain
 
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
CPO Event - Louis Ferretti, What Every Procurement Professional Should Know ...
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
Preventing and Managing Supply Chain Disruptions
Preventing and Managing Supply Chain DisruptionsPreventing and Managing Supply Chain Disruptions
Preventing and Managing Supply Chain Disruptions
 
Cybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdfCybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdf
 
IT Security Risks Survey 2014
IT Security Risks Survey 2014IT Security Risks Survey 2014
IT Security Risks Survey 2014
 

Recently uploaded

Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 

Recently uploaded (20)

Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 

Ppt cscrm (1)

  • 1. WHO CARES? SUPPLY CHAIN MANAGERS’ PERCEPTIONS REGARDING CYBER SUPPLY CHAIN RISK MANAGEMENT IN THE DIGITAL TRANSFORMATION ERA 109578401 HOANG TO NHU 109578403 DO THI TRANG 109678402 NGUYEN THI HONG NHUNG
  • 2. Perceptions of supply chain managers for cyber supply chain risk management (CSCRM) How can organizations deploy a CSCRM strategy? ABSTRACT
  • 3. Digital transformation Cyber supply chain Cyber security 1. INTRODUCTION
  • 5. CYBER SECURITY CYBER RISKS COMPANIES CSCRM in a supply chain are seen as the top threats tend to adopt security measures to protect themselves is necessary for a better level of resilience through the cyber supply chain ORGANIZATIONS LITERATURE involved in a supply chain do not make the same decisions gives technical aspects rather than organization aspects across the supply chain as top threats
  • 6. THIS RESEARCH helps organizations to understand how they can deploy a cyber security strategy RQ1. How relevant are the elements of CSCRM perceived by companies in a supply chain? RQ2. How aligned are the perceptions about CSCRM of companies in a supply chain?
  • 7. Manufacturers Logistics Providers Retailers Survey of the perceptions of supply chain managers regarding 3 main stages: Section 2: Overview of the literature of CSCRM Section 3: Research methodology Section 4: Investigation results Section 5: Findings of the analysis Section 6: Conclusion
  • 8. 2. THEORETICAL BACKGROUND Cyber supply chain risk management (CSCRM)
  • 9. CSCRM PURPOSE is to extend control on cyber risks which enables a continuously adaptive capacity. Supply chain resilience relates to a fit between riskiness and related level of preparedness to manage the risks. Humans are limited to make objective estimations.
  • 10. INDIVIDUALS seem to rely on their perception of risks on their own confidence and belief. Decisions are subjective for what might happen and how they think it might affect. Different approaches by different people make different effects.
  • 11. Cyber risks Sources of risks Responsibility and ownership of the CSCRM Information exchanged Countermeasures to manage cyber risks. CSCRM process includes
  • 12. Initiatives and countermeasures to manage cyber risks Sources of cyber risks Cyber risks in supply chain Responsibility of CSCRM process 34% 25% 34% 2% ELEMENTS OF CSCRM PROCESS Information exchanged in the supply chain 5%
  • 13. 2.1 CYBER RISKS in supply chain • Type 1 includes incidents of phishing and theft or data manipulation. • Type 2 covers cyberstalking and harassment, stock market manipulation, blackmailing and corporate espionage.
  • 14. BACKBONE RISKS • ERP system malfunction • Crash of company’s website • Lack of network connectivity • Malware • Data breach • Damage of records • Theft of credentials
  • 15. 2.2 SOURCES of cyber risks INTERNAL EXTERNAL MALICIOUS NON-INTENTIONAL Suppliers/contractors Current employees Former employees Suppliers/ contractors Customers Competitors Hackers/ Hacktivists Current employees Former employees Technical problems Customers Natural disasters Technical problems Colicchia (2019)
  • 16. 2.2 SOURCES of cyber risks • Employees • Physical objects • Technical assets Ghade (2020)
  • 17. 2.3 RESPONSIBILITY AND OWNERSHIP of CSCRM process • Entire company should engage in the CSCRM process with strong commitment. • Cyber security should be a department in the company.
  • 18. 2.4 INFORMATION EXCHANGED in the supply chain Inventory Sales data Invoices Discounts Order status Production plan Performance Master data
  • 19. 2.5 INITIATIVES AND COUNTERMEASURES to manage cyber risks Pre-attack Actions at the technical level and those directed at or carried out by human factors Trans-attack Data consistency checks and task forces Post-attack Forensics, incident documentation, insurance and recovery and backup procedures Companies seem to respond with pre-attacker phase rather than the others. However, all phases should have a varied set of actions to cover different attacks and different risk environments.
  • 21. 3.1 SAMPLE Focus on a specific sector, specifically the FMCG industry in Italy The Italian FMCG industry is placed among the top four markets in Europe for logistics flows and generated turnover, and it is one of the fastest-growing sectors across Europe, after Spain in 2016 The Italian FMCG supply chain has gone through a deep transformation, leading to the adoption of the principles of efficient consumer response (ECR) and IT technologies
  • 22. 3.1 SAMPLE AND DATABASE The questionnaire was distributed to 524 companies, with the following representation: 321 manufacturers, 134 logistics service providers and 69 retailers. Managers in charge of supply chain management or logistics are chosen as potential respondents for this survey (with minimum 5 years experience) 112 full questionnaires returned.
  • 23. 3.1 DESIGN The resulting questionnaire consisted of six different sections The questions were measured by five-point Likert scales, ranging from “very relevant” to “not relevant”, from “low impact” to “very high impact” (according to the assessment scale presented by Hallikas et al., 2004) or from “very low probability” to “very high probability” (according to the assessment scale presented by Hallikas et al., 2004) Use ANOVA with F statistics value with a significance level of 5% to analyse the results.
  • 24. 4. RESULTS 4.3. Perception of the sources of risk 4.2. Perception of the risk events 4.1. Profile of the respondents’ sample 4.4. Involvement of the organization’s departments in cyber and information risk management 4.5. Perception of the criticality of the information shared across the supply chain 4.6. Perception of the countermeasures and actions for mitigating cyber risks
  • 25. 4.1 PROFILE of the respondents’ sample 64 manufacturers 31 logistics service providers 17 retailers
  • 26. 4.2 PERCEPTION of the risk events the whole FMCG supply chain has experienced the same risk events an almost unanimous consensus around the two events considered to be the most dangerous ones Malware has been judged to be a high risk, especially by retailers
  • 27. 4.3 PERCEPTION of the risk events The Bubble diagram reports the mean values of the three variables for each assessed risk event: impact (vertical axis), probability (horizontal axis) and occurrence (bubble diameter, i.e. the larger the bubble diameter, the more recently the risk event has occurred) Show the occurrence affects the perception of the level of riskness of the evaluated events, especially in terms of impact
  • 28. 4.4.PERCEPTION of the sources of risk Retailers have a generally weaker perception of the sources of cyber and information risks in their supply chain Hackers are seen as the most dangerous source of risk, ranking first in all groups of respondents The “human factor” and the “enemy within” are common threats to all categories of organizations in the FMCG supply chain Logistics Service Providers seem to perceive technical reasons as one of the main causes of risks for their business continuity
  • 29. 4.4 INVOLVEMENT of the organization’s department in cyber and information risk management Most involved
  • 30. 4.5 PERCEPTION of the criticality of the information shared across the supply chain Manufacturer on the master data and invoicing side along with data about their sales Retailers on the discounts and promotional data along with inventory Logistics Service Providers on transport data
  • 31. 4.6 PERCEPTION of the countermeasures andactions for mitigating cyber risks Level of perception regarding the initiatives and countermeasures for managing cyber risks IT technical side is still dominant in every stage of the FMCG supply chain No unanimous consensus regarding some technical measures
  • 32. The perceptions of risk events 5.1 The sources of risk 5.2 The ownership of the CSCRM process 5.3 5.4 The countermeasures to mitigating cyber risks 5. DISCUSSION
  • 33. 5.1. THE PERCEPTION of risk events Logistics Service Providers have a broader perception of the risk events compared to Manufacturers and Retailers
  • 34. • Those risks with higher occurrence are perceived more vividly compared to other risk with lower values of occurrence • Little awareness leads to underestimating the importance of risk events (and the other way around) 5.1. THE PERCEPTION of risk events
  • 35. 5.2. THE SOURCE of risk • The so-called “human factor” is seen as one of the predominant threats to cyber security in supply chains and this is in line with previous literature (Ghadge et al., 2020). • Logistics Service Providers are more concerned about technical problems that could undermine the continuity of their business operations
  • 36. 5.3. THE OWNERSHIP of the CRM process • The medium-high scores assigned to the majority of the business departments • The human resources department is at the bottom of the list and this shows a contradiction in terms of approach to the “human factor” in the CSCRM process
  • 37. 5.4.THE COUNTERMEASURE to mitigating cyber risks Table 9 reports an overall high level of relevance assigned to the set of initiatives but a medium level of alignment of the respondents’ perceptions related to them.
  • 38. Overall, a certain level of alignment of the perception about the elements composing the CSCRM process among the various actors of the FMCG supply chain exists. In this case, it appears that Manufacturers and Retailers are more focused on their domain rather than on the supply chain. On the contrary, it seems that Logistics Service Providers can overcome this limitation and have a broader perception of the risks, sources of risks and criticality of information and data exchanged that span across the different stages of the supply chain. DISCUSSION
  • 39. 6 .1. Theoretical implications This study provides the scientific community with a vertical analysis of a supply chain, something that extends the existing theory on CSCRM It also contributes to extending the current theory with the proposal of a paradigm that highlights the role of Logistics Service Providers as “orchestrators” of the CSCRM process. 6. CONCLUSIONS
  • 40. 6 .2. Practical implications This study provides the industrial community with thought-provoking insights on the misalignment between the perceived relevance of the human factor as a source of risk (high) and the perceived importance of countermeasures to mitigate the risk events stemming from that source (low) This study could help organizations devise procedures and policies to report incidents and create common and shared knowledge about risks that could help them assess the level of risk in their supply chains more closely
  • 41. 01. 解決甚麼問題 ? 02. 為什麼這個問題很重要 ? 03. 提出的論點或假說是甚麼 ? 6 .2. Practical implications
  • 42. 04. 如何證明他們論點與假說為真 ? 05. 實證研究與結果 06. 學術貢獻與實務貢獻