SlideShare a Scribd company logo
1 of 15
Download to read offline
Sponsored by:
Conducted by:On behalf of:
®
®
Creating a Secure
Supply Chain
Creating a Secure Supply Chain
2
Background
For many manufacturers and distributors, the supply chain is the cornerstone to
their business operations. It serves as the main conduit for sourcing goods and
materials as well as the primary channel for moving product out to customers.
So it’s fully comprehensible that operating a secure supply chain is of the
highest priority. Breaches in the system can cripple operations and disruption
of supply chain processes would most assuredly, have a significant impact
on a company’s performance. Breakdowns within the network can affect
an organization’s ability to run a lean operation and control costs, adhere to
delivery schedules and expeditiously fulfill customer orders, safely ship product
and protect intellectual property, maintain brand integrity, and run a socially
responsible supply chain. Those failing to employ protective measures place
their organization at great risk.
In a recent study conducted by Peerless Research Group on behalf of
Logistics Management and Supply Chain Management Review for BSI’s
Supply Chain Solutions Group, supply chain and logistics managers are
in agreement that global supply chains are becoming progressively complex
causing more potential points for disruption along the supply network.
Awareness of risk and threats, and solutions to help identify and prevent supply
chain interruptions are essential for successful supply chain management.
To better understand the potential risks and exposures, as well as strategies
being undertaken to address these hazards, it’s important to first profile
survey respondents. The organizations studied represent a wide cross-
section of manufacturing industries (66%), wholesale and retail trade (14%)
as well as other businesses such as 3PLs, transportation services, etc.
(20%). Businesses of varying sizes are also well represented: 40% work at
small companies (under $100M in annual revenues), 33% are with mid-size
firms ($100M - $999.9M), and 27% are at large enterprises ($1B or more).
Organizations work with, on average, 300 suppliers globally (median: 25) who
operate predominantly in Eastern Asia (75%), Canada (61%), Mexico (51%),
Western Europe (48%), and South East Asia (45%). Roughly one in six (17%)
are government sub-contractors.
“We can’t claim revenue
without the effective
delivery of goods.”
—Distribution Manager
Medical Devices
Annual revs:
$1B - $2.49B
Creating a Secure Supply Chain
3
Challenges in Running an Efficient Supply Chain
This study supports prior research findings in that the challenges companies
now face are universal. Reinforcing customer service and partner relationships,
improving order fulfillment efficiencies, developing and expanding the current
product line and service offerings, and further developing risk management
programs are all pressures with which organizations are now addressing.
And, specific to supply chain networks, managers are concentrating on gaining
greater control over operating costs and cutting expenses, improving overall
supply chain efficiencies, and attaining greater continuity over supply chain
functions. Enabling greater visibility into their supply chain and improving risk
management procedures also rate as critical initiatives.
Today’s Business Challenges
59%
54%
50%
50%
43%
42%
41%
22%
Improving fulfillment efficiencies and performance
Improving customer service
Improving our ability to predict, assess and manage risks
Growing service /product offerings
Improving partner collaboration
Establishing new global partnerships
Workforce management (aging, turnover, reduction, specialization requirements, etc.)
Generating revenue currently constrained by trade compliance issues
Supply Chain Initiatives
72%
65%
57%
44%
36%
36%
34%
34%
33%
30%
27%
27%
26%
25%
25%
Reducing supply chain costs
Controlling operating costs
Improving logistics and related business process efficiencies
Advancing supply chain reliability
Risk management/Assessing and quantifying risk
Gaining/Enabling real-time visibility into our supply chain
Automating processes that are now manual
Establishing KPIs/Performance metrics
Improving transit times
Being compliant with government standards and regulations (e.g., C-TPAT)
Dealing with customs and clearance issues
Supply chain security
Achieving greater accuracy of and proper documentation
Being green/environmentally responsible
Improving asset utilization and tracking
Creating a Secure Supply Chain
4
So while many are focusing their attention on improving supply chain process
management to accomplish critical business goals, organizations (79%) are
either now using or planning to use solutions that would enable suppliers,
as well as customers, greater visibility into their supply chain for tasks such
as checking order or shipment status, document processing, inventory
management, etc.
Operating a Secure Supply Chain
As we previously learned, many of these managers believe supply chain
security is, or at least should be, a high priority initiative within their organization.
Roughly three out of four (73%), in fact, contend it’s a critical component to their
company’s success.
Adoption of Supply Chain Visibility Solutions
Now using 37%
Now evaluating 18%
Will consider within next 2 years 24%
Not considering/using at this time 21%
Importance of Supply Chain Security to their Company’s Business
Extremely important 32%
Very important 41%
Somewhat important 22%
Not very/Not at all important 5%
Creating a Secure Supply Chain
5
Many operations have followed through in immobilizing potential threats. In large
part, the majority (79%) are well-protected against events against threats and
gaps within their supply chain system.
However, managers remain highly cautious of any threats to their supply chain
and continue to be vigilant. As businesses enter new regions and supplier bases
expand, having confidence across supply chain processes is paramount in
managing overseas delivery strategies. Dealing with issues such as an unstable
global economy, increased foreign competition, unpredictable demand for
product, and poor planning during manufacturing and production cycles are
areas of high vulnerability. Any anxiety among supply chain managers is largely
attributed to pronounced uncertainties surrounding these issues.
Rating their Own Supply Chain’s Security
Excellent 7%
Very good 32%
Good 40%
Fair 18%
Poor 3%
“We use multiple vendors
and on-shore warehousing
of product to hedge against
shipping delays, commodity
price increases and natural
disasters.”
—Vice President
Textiles
$100M
Creating a Secure Supply Chain
6
So even though most believe their supply chain is well guarded, one in three
reports that their supply chain experienced a breach resulting in severe
consequences. Infringements have led to in added expenses, additional labor
and resource allocation, and delayed time-to-market as well as product delivery
which all lead to lost business opportunities.
Supply Chain Concerns and Risks
15%32%53%
Economy/Global financial market
volatility impacting supply chain
14%34%52%Competitive forces
14%34%52%Demand volatility
22%29%49%
Project failure due to production
and manufacturing at supplier
21%44%35%Natural causes disrupting supply chain operations
41%24%35%
Counterfeit goods/Unauthorized products/
Intellectual property theft
32%34%34%Legal liabilities of failure to secure supply chain
36%30%34%In-house production or operations
28%41%31%Supplier financial failure
37%33%30%Data breaches at supplier or at own organization
38%35%27%Outsourcing of production or operations
38%36%26%Ineffective screening of cargo content shipments
47%28%25%Improper use of tamper-proof seals
50%26%24%Terrorism targeting supply chain
Highly concerned Somewhat concerned Not concerned
“Our business partners
depend on product
arriving on time and in
good condition to support
manufacturing and sales.
With data and physical
security risks continually
rising, security of assets
is becoming a prime
consideration in supply
chain network design.”
—Operations Manager
Chemicals
$100M
Implications Due to Supply Chain Breaches
80%
70%
55%
43%
38%
38%
16%
Additional costs accrued
Time to market/Product launch delayed
Product quality jeopardized
Business lost
Damage to brand reputation
Fines and legal liabilities incurred
Additional resources (labor, hours,
money, etc.) allocated
Creating a Secure Supply Chain
7
Risk Management
When questioned about their supply chain on disaster recovery capabilities,
managers are fairly evenly split on its efficiency rating.
Rating Supply Chain Capabilities on Business Management and Continuity Planning
Excellent
5%
Very good
25%
Good
41%
Fair
25%
Poor
4%
“We follow our business
continuity plan to identify,
evaluate and mitigate risks
in our operations.”
—Supply Chain Manager
Computers  Electronics
$2.5B+
Creating a Secure Supply Chain
8
Most risks and threats that businesses are able to identify pertain to fears
caused by suppliers, breakdowns sparked internally within logistics operations,
or are a result of production or operations failures. Financial and legal
exposures, uneven market demand for product, mounting competition and
natural disaster are all also checked.
As noted, risks linked to suppliers are a top concern among supply chain managers.
Therefore, it follows that obtaining intelligence to assist in assessing potential supplier-
related pitfalls is a priority. Resources to better protect intellectual property, data to
maintain a business continuity foundation, and updates on government programs and
policies are additional needs to help management stay current.
Risks Quantified
55%
53%
50%
47%
46%
45%
41%
40%
39%
38%
29%
29%
28%
28%
26%
24%
19%
Supplier risks
Logistics risks
In-house production or operations disruptions
Credit risk
Legal liabilities
Demand volatility
Supply chain disruption due to natural causes
Outsourcing risks
Project failure/ production and manufacturing
Competitive risks
Data breaches
Economy/Global financial market volatility
Screening cargo content shipments
Unauthorized products / intellectual property theft
Improper use of tamper-proof seals
Counterfeit goods
Terrorism
Topics for Which More Information is Needed
68%Supplier risk assessment
56%
Brand protection including counterfeiting,
intellectual property rights and un-manifested cargo
54%Business continuity (including natural
disasters, labor strikes/Port outages
49%Government compliance including C-TPAT, AEO, PIP
46%Financial risks including cargo thefts, counterfeits,
insurance increases as well as transport security costs
37%Political instability
27%Social responsibilities
15%Child labor
Creating a Secure Supply Chain
9
Security Measures
Yet, as important as it is for these organizations to maintain a high level of
security for their supply chain and be able to identify and mitigate exposure to
threats, more than one in three are without a plan and are at risk.
For those taking action to increase supply chain security, efforts are ongoing.
Most feel container packaging, storage and shipment consolidation, in
particular, are the areas along the supply chain in which they are most
vulnerable. Businesses are working more closely with partners to define
risk management policies, are establishing security initiatives, and attaining
compliance with global standards.
“The benefits are that in
complying with all of the
supply chain standards,
you have fewer problems
and delays which could
have major consequences
to your business model.”
—Inventory Management
Pharmaceuticals
$100M
“We have a published/
shared SOP with our supply
chain partners which
include service options
should it become necessary
due to breaches, threats or
disasters.
—Logistics, Distribution
Management
Wholesale
$500M - $999.9M
Organizations With a Program
to Minimize Supply Chain Risks
Yes, have a plan 63%
No plan for minimizing
or eliminating risk 37%
Initiatives to Secure Supply Chains
53%
51%
41%
38%
36%
35%
Working with trading partners to set security measures
Risk assessment/Establishing risk management protocols
Establishing security programs and initiatives
Becoming compliant with global customs and clearance standards
Becoming compliant with global transportation standards
Adopting new technology
Creating a Secure Supply Chain
10
While some we interviewed were, understandably, unwilling to discuss their
security strategies, those who could oblige said they are employing risk
management protocols, increasing security measures, adopting policies
on a corporate level, working with more suppliers and mixing modes of
transportation, and installing additional on-site security monitoring systems.
Those without a plan in place candidly cite a lack of resources as the main
obstacle for adoption.
“We have a global/regional
security organization
identifying gaps, issues
and potentialities in
order to determine proper
mitigation/elimination
action plans across the
whole product supply
network including working
with external parties
related to it.”
—Purchasing, Sourcing
Management
Retail
$5B+
“Our company has
developed risk
management protocols for
all corporate subsidiaries
involved with import/
export operations. Each
subsidiary is subject to
annual Risk Management
audits to ensure compliance
with corporate.”
—Operations Manager
Agri-chemicals
$100M
Creating a Secure Supply Chain
11
Complying with Standards  Certifications
Overall, many admit that their efforts to comply with standards to help
supply chain security and risk management policies could be improved.
Extra information resources, greater awareness and exposure to additional
compliance issues and corrective actions, as well as more information on
certification programs are cited as means for upgrading supply chain security.
Most organizations (69%) rely on a set of standards by which they run their
supply chain operations. These protocols are mostly used to assist with
document management (83%), training procedures (66%) and workflow
management applications (44%).
Many further acknowledge they need to learn more about the benefits that
can be garnered from complying with supply chain security standards and
regulations.
“This new century
has provided us with
new challenges and
opportunities. Everyone
involved in the import/
export industry has to
step up their operational
capabilities and adhere to
strict regulatory codes of
conduct. Large and small
countries have enacted
across the board changes
that must be adhered
to. Security remains a
paramount concern as
we provide greater loads
of products and services.
We are responsible to the
countries and world class
that we service. Technology
continues to provide new
avenues in which we
can harness the winds of
change as we elevate our
revenues and our services.”
—Corporate Management
Transportation Services
$1B - $2.49B
Statement: We need to learn More About the Benefits
of Complying with Supply Chain Security
Standards and Regulations
Agree 71%
Neither agree, nor disagree 25%
Disagree 4%
Creating a Secure Supply Chain
12
Programs that are the most commonly recognized among those we surveyed
are the Customs Trade Partnership Against Terrorism (C-TPAT) and standards
sets issued by the International Organization for Standardization (ISO). However,
many of these importers/exporters remain unfamiliar with these as well as other
governing bodies.
Familiarity with Trade Agencies and Organizations
19%30%51%
Standards issued by the International Organization
for Standardization (ISO)
27%28%45%Customs Trade Partnership Against Terrorism (C-TPAT)
38%34%28%World Customs Organization (WCO)
45%31%24%The Container Security Initiative (CSI)
53%25%22%EU Authorized Economic Operator (AEO)
47%33%20%Partners in Protection (PIP)
47%33%20%
The International Ship and Port Facility
Security Code (ISPS Code)
Highly familiar Somewhat familiar Not familiar
“Certain standards, like
CTPAT, AEOs are a must.
Otherwise, shipping takes
longer and becomes more
expensive.”
—Corporate Management
Government Contractor
$100M
Creating a Secure Supply Chain
13
The standards or certifications with which companies are most widely enrolled
are ISO 9001 and C-TPAT, those standards dealing with business management,
environmental, health and safety, and cargo security. On average, the
companies we studied are compliant with roughly two to three standards or
certifications.
Some respondents, curiously, have yet to certify with any of these programs.
While cost, insufficient resources, or a lack of perceived need are listed as
reasons for non-membership, some admit they just have very little knowledge
about these programs and subsequent benefits.
It is widely thought that the C-TPAT program is highly significant (90%) to supply
chain operations. Certification enables greater security measures, and having an
understanding of program features has facilitated shipping processes, reduced
customs inspections and resolved borders issues.
Affiliation with Trade Agencies and Organizations
60%
40%
28%
16%
13%
13%
11%
11%
40%
Certified with any of these programs
Customs Trade Partnership Against Terrorism (C-TPAT)
Standards issued by the International Organization for Standardization (ISO)
World Customs Organization (WCO)
The Container Security Initiative (CSI)
EU Authorized Economic Operator (AEO)
Partners in Protection (PIP)
The International Ship and Port Facility Security Code (ISPS Code)
None of these
Standards and Certification Compliance
61%
39%
29%
1%
11%
27%
16%
15%
15%
10%
7%
Quality ISO 9001
C-TPAT
Environment ISO 14001
Health  Safety OHSAS 18001
Business Continuity ISO 22301
Information Security ISO/IEC 27001
Energy Management ISO 50001
Partners in Protection (PIP)
Authorized Economic Operator (AEO)
Intellectual Property Rights (IPR)
Other
Six out of ten businesses in our survey say they are certified with at least one of
these trade programs; C-TPAT is the most popular.
Creating a Secure Supply Chain
14
Interestingly, as vital as C-TPAT is to supply chain organizations, more than four
out of ten are uncertain about the C-TPAT level they have attained. Most have
reached either Tier I (19%) or Tier II (34%) levels. And, one-half are currently
looking to advance their C-TPAT status.
“There is training
throughout the supply
chain. C-TPAT standards are
to be followed and flexible
modes of transportation to
many accounts.”
—Logistics, Distribution
Management
Fabricated Metals
$500M - $999.9M
“We are C-TPAT Tier 3
(highest tier), so we have
devoted a lot of time,
money and resources
towards this program, in
order to be “fast tracked”
in the event of any sort
of port shut down (once
it reopens), and also
because we feel a sense
of responsibility to secure
our supply chain against
terrorism.”
—Supply Chain Management
Rubber  Plastics
$250M-$499.9M
C-TPAT Status
Tier 1 18%
Tier 2 34%
Tier 3 6%
Don’t know 42%
Creating a Secure Supply Chain
Conclusions
As manufacturers and distributors rely more on their supply chains and as these
networks increase in their complexities, new demands and pressures are forced on
supply chain managers. The stakes are high and security of the supply chain is a
critical factor. Major concerns such as an unstable global economy, aggressive market
competition, demand volatility and production failures can place revenue growth, a
company’s reputation and overall business operations at great risk.
Understanding the nature of potential supply chain breaches and keeping current on
disturbances that can impact supply chain processes can help managers better handle
and mitigate problems related to global supplier concerns, brand protection, financial
risks and causes for disruptions to business activities.
Methodology
This research was conducted by Peerless Research Group on behalf of Logistics
Management and Supply Chain Management Review magazines for BSI’s Supply
Chain Solutions Group. This study was executed in August 2012, and was
administered over the Internet among subscribers to Logistics Management and
Supply Chain Management Review.
Respondents were qualified for being involved in decisions regarding the evaluation and
usage of supply chain management software and solutions for either their company
or for others, and work for an organization involved in exporting or both importing and
exporting goods internationally.
The findings are based on information collected among 226 top logistics and supply
chain managers. Respondents are predominantly executive management (31%),
logistics and operations management (23%), supply chain management (21%).
About BSI Supply Chain Solutions
BSI’s Supply Chain Solutions group is a leading global provider of supply chain risk
and compliance based solutions, supply chain intelligence, assessments, and training
programs geared toward mitigating global supplier and supply chain exposures.
BSI’s Supply Chain security experts work at the forefront partnering with industry
and government on innovative supply chain security solutions and intelligence tools
designed for cargo inspection targeting. Helping companies achieve and maintain
compliance, with a special focus on the C-TPAT 5-step Risk Assessment, is a key focus
of BSI’s Supply Chain Solutions. The combination of our tools and BSI’s field-based,
global network of supply chain security assessment professionals provides our clients
with expert supplier vetting and risk assessment.
For more information:
Call: 1-855-264-4650 or
Visit: www.supplychainsecurity.com

More Related Content

What's hot

GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsKate Tomlinson
 
Preventing and Managing Supply Chain Disruptions
Preventing and Managing Supply Chain DisruptionsPreventing and Managing Supply Chain Disruptions
Preventing and Managing Supply Chain DisruptionsThomas Tanel
 
Supply chain risk management
Supply chain risk management Supply chain risk management
Supply chain risk management Megha Kotak, PMP
 
The New Competitive Advantage – How a robust compliance program can both prot...
The New Competitive Advantage – How a robust compliance program can both prot...The New Competitive Advantage – How a robust compliance program can both prot...
The New Competitive Advantage – How a robust compliance program can both prot...PECB
 
Vulnerbility of supply chain
Vulnerbility of supply chainVulnerbility of supply chain
Vulnerbility of supply chainBishop Nkhwazi
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementSALIH AHMED ISLAM
 
What Every Procurement Professional Should Know About Supplier Risk Managemen...
What Every Procurement Professional Should Know About Supplier Risk Managemen...What Every Procurement Professional Should Know About Supplier Risk Managemen...
What Every Procurement Professional Should Know About Supplier Risk Managemen...IBM Watson Commerce
 
Chemical Supply Chain
Chemical Supply ChainChemical Supply Chain
Chemical Supply ChainNatashaS7
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk ManagementAnand Subramaniam
 
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best PracticeThird Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best PracticeDVV Solutions Third Party Risk Management
 
Risk Management in Supply chain management
Risk Management in Supply chain managementRisk Management in Supply chain management
Risk Management in Supply chain managementNishikant Rajeshirke
 
Third party risk management and it’s complexities
Third party risk management and it’s complexitiesThird party risk management and it’s complexities
Third party risk management and it’s complexitieskevinmass30
 
Ct annual meeting 2011
Ct annual meeting 2011Ct annual meeting 2011
Ct annual meeting 2011erin_gregory
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyNICSA
 
Supplier Risk Management for ISM 4-16
Supplier Risk Management for ISM 4-16Supplier Risk Management for ISM 4-16
Supplier Risk Management for ISM 4-16Randy Christoffersen
 
ValueMagics - a road map from cost to value
ValueMagics - a road map from cost to valueValueMagics - a road map from cost to value
ValueMagics - a road map from cost to valueHans Verhulst
 
Supply Chain Risk Management 2015 Summary Charts
Supply Chain Risk Management 2015 Summary ChartsSupply Chain Risk Management 2015 Summary Charts
Supply Chain Risk Management 2015 Summary ChartsLora Cecere
 

What's hot (20)

Auditing supply chain risk_management
Auditing supply chain risk_management Auditing supply chain risk_management
Auditing supply chain risk_management
 
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
 
Preventing and Managing Supply Chain Disruptions
Preventing and Managing Supply Chain DisruptionsPreventing and Managing Supply Chain Disruptions
Preventing and Managing Supply Chain Disruptions
 
Supply chain risk management
Supply chain risk management Supply chain risk management
Supply chain risk management
 
The New Competitive Advantage – How a robust compliance program can both prot...
The New Competitive Advantage – How a robust compliance program can both prot...The New Competitive Advantage – How a robust compliance program can both prot...
The New Competitive Advantage – How a robust compliance program can both prot...
 
Vulnerbility of supply chain
Vulnerbility of supply chainVulnerbility of supply chain
Vulnerbility of supply chain
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
 
What Every Procurement Professional Should Know About Supplier Risk Managemen...
What Every Procurement Professional Should Know About Supplier Risk Managemen...What Every Procurement Professional Should Know About Supplier Risk Managemen...
What Every Procurement Professional Should Know About Supplier Risk Managemen...
 
Chemical Supply Chain
Chemical Supply ChainChemical Supply Chain
Chemical Supply Chain
 
TI Managing Third Party Risk
TI Managing Third Party RiskTI Managing Third Party Risk
TI Managing Third Party Risk
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk Management
 
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best PracticeThird Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
 
Risk Management in Supply chain management
Risk Management in Supply chain managementRisk Management in Supply chain management
Risk Management in Supply chain management
 
Third party risk management and it’s complexities
Third party risk management and it’s complexitiesThird party risk management and it’s complexities
Third party risk management and it’s complexities
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
 
Ct annual meeting 2011
Ct annual meeting 2011Ct annual meeting 2011
Ct annual meeting 2011
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Supplier Risk Management for ISM 4-16
Supplier Risk Management for ISM 4-16Supplier Risk Management for ISM 4-16
Supplier Risk Management for ISM 4-16
 
ValueMagics - a road map from cost to value
ValueMagics - a road map from cost to valueValueMagics - a road map from cost to value
ValueMagics - a road map from cost to value
 
Supply Chain Risk Management 2015 Summary Charts
Supply Chain Risk Management 2015 Summary ChartsSupply Chain Risk Management 2015 Summary Charts
Supply Chain Risk Management 2015 Summary Charts
 

Similar to Creating a secure supply chain

Supply Chain optimization & risks factors
Supply Chain optimization & risks factorsSupply Chain optimization & risks factors
Supply Chain optimization & risks factorsAlok Anand
 
Managing Today’s Supply Chain
Managing Today’s Supply ChainManaging Today’s Supply Chain
Managing Today’s Supply Chainmubarak2009
 
SAPICS 2016 DSchoeman Ver2.3 Final lin
SAPICS 2016 DSchoeman Ver2.3 Final linSAPICS 2016 DSchoeman Ver2.3 Final lin
SAPICS 2016 DSchoeman Ver2.3 Final linDanie Schoeman
 
Security, Compliance & Loss Prevention Part 4.pptx
Security, Compliance & Loss Prevention Part 4.pptxSecurity, Compliance & Loss Prevention Part 4.pptx
Security, Compliance & Loss Prevention Part 4.pptxSheldon Byron
 
SupplyChainRiskAreas
SupplyChainRiskAreasSupplyChainRiskAreas
SupplyChainRiskAreasJeremy Castle
 
La gestión de la cadena de suministro en un entorno económico cambiante
La gestión de la cadena de suministro en un entorno económico cambianteLa gestión de la cadena de suministro en un entorno económico cambiante
La gestión de la cadena de suministro en un entorno económico cambianteFundación Ramón Areces
 
SCL Event - Louis Ferretti - IBM - Project Executive, Product Environmental ...
SCL Event -  Louis Ferretti - IBM - Project Executive, Product Environmental ...SCL Event -  Louis Ferretti - IBM - Project Executive, Product Environmental ...
SCL Event - Louis Ferretti - IBM - Project Executive, Product Environmental ...Global Business Intel
 
Avoid Post-M&A Supply Chain Surprises - OMTEC 2017
Avoid Post-M&A Supply Chain Surprises - OMTEC 2017Avoid Post-M&A Supply Chain Surprises - OMTEC 2017
Avoid Post-M&A Supply Chain Surprises - OMTEC 2017April Bright
 
Larry Savage Jr Alabama Talks About Factors Affecting Supply Chain.pptx
Larry Savage Jr Alabama Talks About Factors Affecting Supply Chain.pptxLarry Savage Jr Alabama Talks About Factors Affecting Supply Chain.pptx
Larry Savage Jr Alabama Talks About Factors Affecting Supply Chain.pptxLarry Savage Jr
 
Effective Solutions for Your Supply Chain Risks
Effective Solutions for Your Supply Chain RisksEffective Solutions for Your Supply Chain Risks
Effective Solutions for Your Supply Chain RisksHalo BI
 
On the-trail-to-traceability
On the-trail-to-traceabilityOn the-trail-to-traceability
On the-trail-to-traceabilitytrongctm2011
 
On the-trail-to-traceability
On the-trail-to-traceabilityOn the-trail-to-traceability
On the-trail-to-traceabilitytrongctm2011
 
Blockchain in Supply Chain Management
Blockchain in Supply Chain ManagementBlockchain in Supply Chain Management
Blockchain in Supply Chain Management101 Blockchains
 
Ia perspective-on-supply-chain-risk
Ia perspective-on-supply-chain-riskIa perspective-on-supply-chain-risk
Ia perspective-on-supply-chain-riskM Zaki Rahmani
 
EAI Compliance Infographic
EAI Compliance InfographicEAI Compliance Infographic
EAI Compliance InfographicIdeba
 
2015 MHI Annual Industry Report – Supply chain innovation – Making the imposs...
2015 MHI Annual Industry Report – Supply chain innovation – Making the imposs...2015 MHI Annual Industry Report – Supply chain innovation – Making the imposs...
2015 MHI Annual Industry Report – Supply chain innovation – Making the imposs...Leon Eymael
 
Key Concerns in the Pharmaceutical and Healthcare Supply Chain - D.Quinn Apri...
Key Concerns in the Pharmaceutical and Healthcare Supply Chain - D.Quinn Apri...Key Concerns in the Pharmaceutical and Healthcare Supply Chain - D.Quinn Apri...
Key Concerns in the Pharmaceutical and Healthcare Supply Chain - D.Quinn Apri...Dan Quinn
 

Similar to Creating a secure supply chain (20)

Supply Chain optimization & risks factors
Supply Chain optimization & risks factorsSupply Chain optimization & risks factors
Supply Chain optimization & risks factors
 
Managing Today’s Supply Chain
Managing Today’s Supply ChainManaging Today’s Supply Chain
Managing Today’s Supply Chain
 
SAPICS 2016 DSchoeman Ver2.3 Final lin
SAPICS 2016 DSchoeman Ver2.3 Final linSAPICS 2016 DSchoeman Ver2.3 Final lin
SAPICS 2016 DSchoeman Ver2.3 Final lin
 
Security, Compliance & Loss Prevention Part 4.pptx
Security, Compliance & Loss Prevention Part 4.pptxSecurity, Compliance & Loss Prevention Part 4.pptx
Security, Compliance & Loss Prevention Part 4.pptx
 
SupplyChainRiskAreas
SupplyChainRiskAreasSupplyChainRiskAreas
SupplyChainRiskAreas
 
La gestión de la cadena de suministro en un entorno económico cambiante
La gestión de la cadena de suministro en un entorno económico cambianteLa gestión de la cadena de suministro en un entorno económico cambiante
La gestión de la cadena de suministro en un entorno económico cambiante
 
My slides
My slidesMy slides
My slides
 
SCL Event - Louis Ferretti - IBM - Project Executive, Product Environmental ...
SCL Event -  Louis Ferretti - IBM - Project Executive, Product Environmental ...SCL Event -  Louis Ferretti - IBM - Project Executive, Product Environmental ...
SCL Event - Louis Ferretti - IBM - Project Executive, Product Environmental ...
 
Avoid Post-M&A Supply Chain Surprises - OMTEC 2017
Avoid Post-M&A Supply Chain Surprises - OMTEC 2017Avoid Post-M&A Supply Chain Surprises - OMTEC 2017
Avoid Post-M&A Supply Chain Surprises - OMTEC 2017
 
Larry Savage Jr Alabama Talks About Factors Affecting Supply Chain.pptx
Larry Savage Jr Alabama Talks About Factors Affecting Supply Chain.pptxLarry Savage Jr Alabama Talks About Factors Affecting Supply Chain.pptx
Larry Savage Jr Alabama Talks About Factors Affecting Supply Chain.pptx
 
Effective Solutions for Your Supply Chain Risks
Effective Solutions for Your Supply Chain RisksEffective Solutions for Your Supply Chain Risks
Effective Solutions for Your Supply Chain Risks
 
On the-trail-to-traceability
On the-trail-to-traceabilityOn the-trail-to-traceability
On the-trail-to-traceability
 
On the-trail-to-traceability
On the-trail-to-traceabilityOn the-trail-to-traceability
On the-trail-to-traceability
 
Blockchain in Supply Chain Management
Blockchain in Supply Chain ManagementBlockchain in Supply Chain Management
Blockchain in Supply Chain Management
 
Ia perspective-on-supply-chain-risk
Ia perspective-on-supply-chain-riskIa perspective-on-supply-chain-risk
Ia perspective-on-supply-chain-risk
 
EAI Compliance Infographic
EAI Compliance InfographicEAI Compliance Infographic
EAI Compliance Infographic
 
EAI Compliance Infographic
EAI Compliance InfographicEAI Compliance Infographic
EAI Compliance Infographic
 
industry-report-2015
industry-report-2015industry-report-2015
industry-report-2015
 
2015 MHI Annual Industry Report – Supply chain innovation – Making the imposs...
2015 MHI Annual Industry Report – Supply chain innovation – Making the imposs...2015 MHI Annual Industry Report – Supply chain innovation – Making the imposs...
2015 MHI Annual Industry Report – Supply chain innovation – Making the imposs...
 
Key Concerns in the Pharmaceutical and Healthcare Supply Chain - D.Quinn Apri...
Key Concerns in the Pharmaceutical and Healthcare Supply Chain - D.Quinn Apri...Key Concerns in the Pharmaceutical and Healthcare Supply Chain - D.Quinn Apri...
Key Concerns in the Pharmaceutical and Healthcare Supply Chain - D.Quinn Apri...
 

More from Rezgar Mohammad

A survey on data security in data warehousing1
A survey on data security in data warehousing1A survey on data security in data warehousing1
A survey on data security in data warehousing1Rezgar Mohammad
 
2904 supply chain_cyber_security
2904 supply chain_cyber_security2904 supply chain_cyber_security
2904 supply chain_cyber_securityRezgar Mohammad
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkRezgar Mohammad
 
Impacts of internet of things on supply chains
Impacts of internet of things on supply chainsImpacts of internet of things on supply chains
Impacts of internet of things on supply chainsRezgar Mohammad
 
A simulation based evaluation approach smart supply risk management
A simulation based evaluation approach smart supply risk managementA simulation based evaluation approach smart supply risk management
A simulation based evaluation approach smart supply risk managementRezgar Mohammad
 
A survey on data security in data warehousing
A survey on data security in data warehousing A survey on data security in data warehousing
A survey on data security in data warehousing Rezgar Mohammad
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fogRezgar Mohammad
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersRezgar Mohammad
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issuesRezgar Mohammad
 

More from Rezgar Mohammad (9)

A survey on data security in data warehousing1
A survey on data security in data warehousing1A survey on data security in data warehousing1
A survey on data security in data warehousing1
 
2904 supply chain_cyber_security
2904 supply chain_cyber_security2904 supply chain_cyber_security
2904 supply chain_cyber_security
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
 
Impacts of internet of things on supply chains
Impacts of internet of things on supply chainsImpacts of internet of things on supply chains
Impacts of internet of things on supply chains
 
A simulation based evaluation approach smart supply risk management
A simulation based evaluation approach smart supply risk managementA simulation based evaluation approach smart supply risk management
A simulation based evaluation approach smart supply risk management
 
A survey on data security in data warehousing
A survey on data security in data warehousing A survey on data security in data warehousing
A survey on data security in data warehousing
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Creating a secure supply chain

  • 1. Sponsored by: Conducted by:On behalf of: ® ® Creating a Secure Supply Chain
  • 2. Creating a Secure Supply Chain 2 Background For many manufacturers and distributors, the supply chain is the cornerstone to their business operations. It serves as the main conduit for sourcing goods and materials as well as the primary channel for moving product out to customers. So it’s fully comprehensible that operating a secure supply chain is of the highest priority. Breaches in the system can cripple operations and disruption of supply chain processes would most assuredly, have a significant impact on a company’s performance. Breakdowns within the network can affect an organization’s ability to run a lean operation and control costs, adhere to delivery schedules and expeditiously fulfill customer orders, safely ship product and protect intellectual property, maintain brand integrity, and run a socially responsible supply chain. Those failing to employ protective measures place their organization at great risk. In a recent study conducted by Peerless Research Group on behalf of Logistics Management and Supply Chain Management Review for BSI’s Supply Chain Solutions Group, supply chain and logistics managers are in agreement that global supply chains are becoming progressively complex causing more potential points for disruption along the supply network. Awareness of risk and threats, and solutions to help identify and prevent supply chain interruptions are essential for successful supply chain management. To better understand the potential risks and exposures, as well as strategies being undertaken to address these hazards, it’s important to first profile survey respondents. The organizations studied represent a wide cross- section of manufacturing industries (66%), wholesale and retail trade (14%) as well as other businesses such as 3PLs, transportation services, etc. (20%). Businesses of varying sizes are also well represented: 40% work at small companies (under $100M in annual revenues), 33% are with mid-size firms ($100M - $999.9M), and 27% are at large enterprises ($1B or more). Organizations work with, on average, 300 suppliers globally (median: 25) who operate predominantly in Eastern Asia (75%), Canada (61%), Mexico (51%), Western Europe (48%), and South East Asia (45%). Roughly one in six (17%) are government sub-contractors. “We can’t claim revenue without the effective delivery of goods.” —Distribution Manager Medical Devices Annual revs: $1B - $2.49B
  • 3. Creating a Secure Supply Chain 3 Challenges in Running an Efficient Supply Chain This study supports prior research findings in that the challenges companies now face are universal. Reinforcing customer service and partner relationships, improving order fulfillment efficiencies, developing and expanding the current product line and service offerings, and further developing risk management programs are all pressures with which organizations are now addressing. And, specific to supply chain networks, managers are concentrating on gaining greater control over operating costs and cutting expenses, improving overall supply chain efficiencies, and attaining greater continuity over supply chain functions. Enabling greater visibility into their supply chain and improving risk management procedures also rate as critical initiatives. Today’s Business Challenges 59% 54% 50% 50% 43% 42% 41% 22% Improving fulfillment efficiencies and performance Improving customer service Improving our ability to predict, assess and manage risks Growing service /product offerings Improving partner collaboration Establishing new global partnerships Workforce management (aging, turnover, reduction, specialization requirements, etc.) Generating revenue currently constrained by trade compliance issues Supply Chain Initiatives 72% 65% 57% 44% 36% 36% 34% 34% 33% 30% 27% 27% 26% 25% 25% Reducing supply chain costs Controlling operating costs Improving logistics and related business process efficiencies Advancing supply chain reliability Risk management/Assessing and quantifying risk Gaining/Enabling real-time visibility into our supply chain Automating processes that are now manual Establishing KPIs/Performance metrics Improving transit times Being compliant with government standards and regulations (e.g., C-TPAT) Dealing with customs and clearance issues Supply chain security Achieving greater accuracy of and proper documentation Being green/environmentally responsible Improving asset utilization and tracking
  • 4. Creating a Secure Supply Chain 4 So while many are focusing their attention on improving supply chain process management to accomplish critical business goals, organizations (79%) are either now using or planning to use solutions that would enable suppliers, as well as customers, greater visibility into their supply chain for tasks such as checking order or shipment status, document processing, inventory management, etc. Operating a Secure Supply Chain As we previously learned, many of these managers believe supply chain security is, or at least should be, a high priority initiative within their organization. Roughly three out of four (73%), in fact, contend it’s a critical component to their company’s success. Adoption of Supply Chain Visibility Solutions Now using 37% Now evaluating 18% Will consider within next 2 years 24% Not considering/using at this time 21% Importance of Supply Chain Security to their Company’s Business Extremely important 32% Very important 41% Somewhat important 22% Not very/Not at all important 5%
  • 5. Creating a Secure Supply Chain 5 Many operations have followed through in immobilizing potential threats. In large part, the majority (79%) are well-protected against events against threats and gaps within their supply chain system. However, managers remain highly cautious of any threats to their supply chain and continue to be vigilant. As businesses enter new regions and supplier bases expand, having confidence across supply chain processes is paramount in managing overseas delivery strategies. Dealing with issues such as an unstable global economy, increased foreign competition, unpredictable demand for product, and poor planning during manufacturing and production cycles are areas of high vulnerability. Any anxiety among supply chain managers is largely attributed to pronounced uncertainties surrounding these issues. Rating their Own Supply Chain’s Security Excellent 7% Very good 32% Good 40% Fair 18% Poor 3% “We use multiple vendors and on-shore warehousing of product to hedge against shipping delays, commodity price increases and natural disasters.” —Vice President Textiles $100M
  • 6. Creating a Secure Supply Chain 6 So even though most believe their supply chain is well guarded, one in three reports that their supply chain experienced a breach resulting in severe consequences. Infringements have led to in added expenses, additional labor and resource allocation, and delayed time-to-market as well as product delivery which all lead to lost business opportunities. Supply Chain Concerns and Risks 15%32%53% Economy/Global financial market volatility impacting supply chain 14%34%52%Competitive forces 14%34%52%Demand volatility 22%29%49% Project failure due to production and manufacturing at supplier 21%44%35%Natural causes disrupting supply chain operations 41%24%35% Counterfeit goods/Unauthorized products/ Intellectual property theft 32%34%34%Legal liabilities of failure to secure supply chain 36%30%34%In-house production or operations 28%41%31%Supplier financial failure 37%33%30%Data breaches at supplier or at own organization 38%35%27%Outsourcing of production or operations 38%36%26%Ineffective screening of cargo content shipments 47%28%25%Improper use of tamper-proof seals 50%26%24%Terrorism targeting supply chain Highly concerned Somewhat concerned Not concerned “Our business partners depend on product arriving on time and in good condition to support manufacturing and sales. With data and physical security risks continually rising, security of assets is becoming a prime consideration in supply chain network design.” —Operations Manager Chemicals $100M Implications Due to Supply Chain Breaches 80% 70% 55% 43% 38% 38% 16% Additional costs accrued Time to market/Product launch delayed Product quality jeopardized Business lost Damage to brand reputation Fines and legal liabilities incurred Additional resources (labor, hours, money, etc.) allocated
  • 7. Creating a Secure Supply Chain 7 Risk Management When questioned about their supply chain on disaster recovery capabilities, managers are fairly evenly split on its efficiency rating. Rating Supply Chain Capabilities on Business Management and Continuity Planning Excellent 5% Very good 25% Good 41% Fair 25% Poor 4% “We follow our business continuity plan to identify, evaluate and mitigate risks in our operations.” —Supply Chain Manager Computers Electronics $2.5B+
  • 8. Creating a Secure Supply Chain 8 Most risks and threats that businesses are able to identify pertain to fears caused by suppliers, breakdowns sparked internally within logistics operations, or are a result of production or operations failures. Financial and legal exposures, uneven market demand for product, mounting competition and natural disaster are all also checked. As noted, risks linked to suppliers are a top concern among supply chain managers. Therefore, it follows that obtaining intelligence to assist in assessing potential supplier- related pitfalls is a priority. Resources to better protect intellectual property, data to maintain a business continuity foundation, and updates on government programs and policies are additional needs to help management stay current. Risks Quantified 55% 53% 50% 47% 46% 45% 41% 40% 39% 38% 29% 29% 28% 28% 26% 24% 19% Supplier risks Logistics risks In-house production or operations disruptions Credit risk Legal liabilities Demand volatility Supply chain disruption due to natural causes Outsourcing risks Project failure/ production and manufacturing Competitive risks Data breaches Economy/Global financial market volatility Screening cargo content shipments Unauthorized products / intellectual property theft Improper use of tamper-proof seals Counterfeit goods Terrorism Topics for Which More Information is Needed 68%Supplier risk assessment 56% Brand protection including counterfeiting, intellectual property rights and un-manifested cargo 54%Business continuity (including natural disasters, labor strikes/Port outages 49%Government compliance including C-TPAT, AEO, PIP 46%Financial risks including cargo thefts, counterfeits, insurance increases as well as transport security costs 37%Political instability 27%Social responsibilities 15%Child labor
  • 9. Creating a Secure Supply Chain 9 Security Measures Yet, as important as it is for these organizations to maintain a high level of security for their supply chain and be able to identify and mitigate exposure to threats, more than one in three are without a plan and are at risk. For those taking action to increase supply chain security, efforts are ongoing. Most feel container packaging, storage and shipment consolidation, in particular, are the areas along the supply chain in which they are most vulnerable. Businesses are working more closely with partners to define risk management policies, are establishing security initiatives, and attaining compliance with global standards. “The benefits are that in complying with all of the supply chain standards, you have fewer problems and delays which could have major consequences to your business model.” —Inventory Management Pharmaceuticals $100M “We have a published/ shared SOP with our supply chain partners which include service options should it become necessary due to breaches, threats or disasters. —Logistics, Distribution Management Wholesale $500M - $999.9M Organizations With a Program to Minimize Supply Chain Risks Yes, have a plan 63% No plan for minimizing or eliminating risk 37% Initiatives to Secure Supply Chains 53% 51% 41% 38% 36% 35% Working with trading partners to set security measures Risk assessment/Establishing risk management protocols Establishing security programs and initiatives Becoming compliant with global customs and clearance standards Becoming compliant with global transportation standards Adopting new technology
  • 10. Creating a Secure Supply Chain 10 While some we interviewed were, understandably, unwilling to discuss their security strategies, those who could oblige said they are employing risk management protocols, increasing security measures, adopting policies on a corporate level, working with more suppliers and mixing modes of transportation, and installing additional on-site security monitoring systems. Those without a plan in place candidly cite a lack of resources as the main obstacle for adoption. “We have a global/regional security organization identifying gaps, issues and potentialities in order to determine proper mitigation/elimination action plans across the whole product supply network including working with external parties related to it.” —Purchasing, Sourcing Management Retail $5B+ “Our company has developed risk management protocols for all corporate subsidiaries involved with import/ export operations. Each subsidiary is subject to annual Risk Management audits to ensure compliance with corporate.” —Operations Manager Agri-chemicals $100M
  • 11. Creating a Secure Supply Chain 11 Complying with Standards Certifications Overall, many admit that their efforts to comply with standards to help supply chain security and risk management policies could be improved. Extra information resources, greater awareness and exposure to additional compliance issues and corrective actions, as well as more information on certification programs are cited as means for upgrading supply chain security. Most organizations (69%) rely on a set of standards by which they run their supply chain operations. These protocols are mostly used to assist with document management (83%), training procedures (66%) and workflow management applications (44%). Many further acknowledge they need to learn more about the benefits that can be garnered from complying with supply chain security standards and regulations. “This new century has provided us with new challenges and opportunities. Everyone involved in the import/ export industry has to step up their operational capabilities and adhere to strict regulatory codes of conduct. Large and small countries have enacted across the board changes that must be adhered to. Security remains a paramount concern as we provide greater loads of products and services. We are responsible to the countries and world class that we service. Technology continues to provide new avenues in which we can harness the winds of change as we elevate our revenues and our services.” —Corporate Management Transportation Services $1B - $2.49B Statement: We need to learn More About the Benefits of Complying with Supply Chain Security Standards and Regulations Agree 71% Neither agree, nor disagree 25% Disagree 4%
  • 12. Creating a Secure Supply Chain 12 Programs that are the most commonly recognized among those we surveyed are the Customs Trade Partnership Against Terrorism (C-TPAT) and standards sets issued by the International Organization for Standardization (ISO). However, many of these importers/exporters remain unfamiliar with these as well as other governing bodies. Familiarity with Trade Agencies and Organizations 19%30%51% Standards issued by the International Organization for Standardization (ISO) 27%28%45%Customs Trade Partnership Against Terrorism (C-TPAT) 38%34%28%World Customs Organization (WCO) 45%31%24%The Container Security Initiative (CSI) 53%25%22%EU Authorized Economic Operator (AEO) 47%33%20%Partners in Protection (PIP) 47%33%20% The International Ship and Port Facility Security Code (ISPS Code) Highly familiar Somewhat familiar Not familiar “Certain standards, like CTPAT, AEOs are a must. Otherwise, shipping takes longer and becomes more expensive.” —Corporate Management Government Contractor $100M
  • 13. Creating a Secure Supply Chain 13 The standards or certifications with which companies are most widely enrolled are ISO 9001 and C-TPAT, those standards dealing with business management, environmental, health and safety, and cargo security. On average, the companies we studied are compliant with roughly two to three standards or certifications. Some respondents, curiously, have yet to certify with any of these programs. While cost, insufficient resources, or a lack of perceived need are listed as reasons for non-membership, some admit they just have very little knowledge about these programs and subsequent benefits. It is widely thought that the C-TPAT program is highly significant (90%) to supply chain operations. Certification enables greater security measures, and having an understanding of program features has facilitated shipping processes, reduced customs inspections and resolved borders issues. Affiliation with Trade Agencies and Organizations 60% 40% 28% 16% 13% 13% 11% 11% 40% Certified with any of these programs Customs Trade Partnership Against Terrorism (C-TPAT) Standards issued by the International Organization for Standardization (ISO) World Customs Organization (WCO) The Container Security Initiative (CSI) EU Authorized Economic Operator (AEO) Partners in Protection (PIP) The International Ship and Port Facility Security Code (ISPS Code) None of these Standards and Certification Compliance 61% 39% 29% 1% 11% 27% 16% 15% 15% 10% 7% Quality ISO 9001 C-TPAT Environment ISO 14001 Health Safety OHSAS 18001 Business Continuity ISO 22301 Information Security ISO/IEC 27001 Energy Management ISO 50001 Partners in Protection (PIP) Authorized Economic Operator (AEO) Intellectual Property Rights (IPR) Other Six out of ten businesses in our survey say they are certified with at least one of these trade programs; C-TPAT is the most popular.
  • 14. Creating a Secure Supply Chain 14 Interestingly, as vital as C-TPAT is to supply chain organizations, more than four out of ten are uncertain about the C-TPAT level they have attained. Most have reached either Tier I (19%) or Tier II (34%) levels. And, one-half are currently looking to advance their C-TPAT status. “There is training throughout the supply chain. C-TPAT standards are to be followed and flexible modes of transportation to many accounts.” —Logistics, Distribution Management Fabricated Metals $500M - $999.9M “We are C-TPAT Tier 3 (highest tier), so we have devoted a lot of time, money and resources towards this program, in order to be “fast tracked” in the event of any sort of port shut down (once it reopens), and also because we feel a sense of responsibility to secure our supply chain against terrorism.” —Supply Chain Management Rubber Plastics $250M-$499.9M C-TPAT Status Tier 1 18% Tier 2 34% Tier 3 6% Don’t know 42%
  • 15. Creating a Secure Supply Chain Conclusions As manufacturers and distributors rely more on their supply chains and as these networks increase in their complexities, new demands and pressures are forced on supply chain managers. The stakes are high and security of the supply chain is a critical factor. Major concerns such as an unstable global economy, aggressive market competition, demand volatility and production failures can place revenue growth, a company’s reputation and overall business operations at great risk. Understanding the nature of potential supply chain breaches and keeping current on disturbances that can impact supply chain processes can help managers better handle and mitigate problems related to global supplier concerns, brand protection, financial risks and causes for disruptions to business activities. Methodology This research was conducted by Peerless Research Group on behalf of Logistics Management and Supply Chain Management Review magazines for BSI’s Supply Chain Solutions Group. This study was executed in August 2012, and was administered over the Internet among subscribers to Logistics Management and Supply Chain Management Review. Respondents were qualified for being involved in decisions regarding the evaluation and usage of supply chain management software and solutions for either their company or for others, and work for an organization involved in exporting or both importing and exporting goods internationally. The findings are based on information collected among 226 top logistics and supply chain managers. Respondents are predominantly executive management (31%), logistics and operations management (23%), supply chain management (21%). About BSI Supply Chain Solutions BSI’s Supply Chain Solutions group is a leading global provider of supply chain risk and compliance based solutions, supply chain intelligence, assessments, and training programs geared toward mitigating global supplier and supply chain exposures. BSI’s Supply Chain security experts work at the forefront partnering with industry and government on innovative supply chain security solutions and intelligence tools designed for cargo inspection targeting. Helping companies achieve and maintain compliance, with a special focus on the C-TPAT 5-step Risk Assessment, is a key focus of BSI’s Supply Chain Solutions. The combination of our tools and BSI’s field-based, global network of supply chain security assessment professionals provides our clients with expert supplier vetting and risk assessment. For more information: Call: 1-855-264-4650 or Visit: www.supplychainsecurity.com