SlideShare a Scribd company logo
1 of 1
Download to read offline
Why businesses must take a risk management approach to supply chain security
ILAN RUBIN
O
rganisations that use supply
chains need to be aware of
the cybersecurity risks created
by vulnerabilities in upstream or
downstream partners. Often, the lack
of security is unintentional. A supplier
may unknowingly leave security gaps in
information, which is then incorporated
into the organisations’ systems and
may be exploited by malicious hackers.
It’s essential for organisations to work
closely with their supply chain partners
to overcome these challenges, and to
secure the supply chain.
Chief information security officers
(CISO) and other leaders responsible
for security can be forgiven for being
frustrated by their limited control over
supply chain activities. Supply chains
tend to be dynamic, highly complex,
and fluid. And with no easy way to
predict where an attack might come
from, this makes the job of securing
the organisation even harder.
This challenge is equally
confounding for small and large
businesses. While small organisations
don’t tend to have the required
resources to conduct due diligence
throughout the supply chain, large
organisations tend to have such
disparate and complex supply chains
that conducting due diligence is
similarly challenging.
However, the more complex the
supply chain, the more important
it is to have a strong security
foundation. And, even though CISO
can’t necessarily control all the actions
of supply chain partners, they’re
still responsible for securing the
organisation, so they must pay careful
attention to the supply chain.
CISO should start by creating a risk
management plan pertaining to the
supply chain before determining on
what areas to focus and where some
risk may be acceptable. Characterising
risk based on its consequences is
a useful way of determining what
is acceptable and what must be
mitigated. Organisations can then start
to plan their security measures.
Organisations should protect
information based on its value. This
means it can segment its assets
to protect the crown jewels more
effectively and without wasting
resources. This approach can also
restrict the scope or spread of
compromised supply chain systems.
Open up a conversation with all
partners about supply chain risks
and security best practices to ensure
that everyone in the supply chain is
working towards the same goal of
security. This can help overcome factors
such as human error, which is often a
significant contributor to data breaches.
Just by being aware of the need for
security best practices, organisations
can reduce the risk of people
inadvertently creating vulnerabilities.
While mitigating the risks across the
supply chain can seem overwhelmingly
difficult, it is essential to take a risk
management approach that minimises
the dangers. This might involve
incorporating a security fabric approach,
which delivers broad protection and
visibility to every network segment,
device, and appliance, whether virtual,
in the cloud, or on-premises.
Ilan Rubin is the managing director of
Wavelink, distributor of Fortinet security
applications. For more information
email sales@wavelink.com.au,
call +61 3 9832 4444 or
visit www.wavelink.com.au. ■
MANAGE RISK
10 | MHD MAY / JUNE 2019
MHD COMMENT

More Related Content

What's hot

Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsMarce Torres
 
CyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROICyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROISiemplify
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityMarkLogic
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessSecurityOn-Demand
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident DetectionTripwire
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security InfographicIdeba
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security PresentationIdeba
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Pharos Security Solution
Pharos Security SolutionPharos Security Solution
Pharos Security SolutionPharos Security
 
MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationSiemplify
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioCyberGroup
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarCommunity IT Innovators
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security RisksHeimdal Security
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 
Information security SMBS need it, MSPS can provide it
Information security  SMBS need it, MSPS can provide itInformation security  SMBS need it, MSPS can provide it
Information security SMBS need it, MSPS can provide itGlobizzcon
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
 

What's hot (20)

CISSPills #3.05
CISSPills #3.05CISSPills #3.05
CISSPills #3.05
 
Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
 
The Cyber Attack Risk
The Cyber Attack RiskThe Cyber Attack Risk
The Cyber Attack Risk
 
CyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROICyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROI
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data Security
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security Success
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Pharos Security Solution
Pharos Security SolutionPharos Security Solution
Pharos Security Solution
 
MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & Automation
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.io
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
Information security SMBS need it, MSPS can provide it
Information security  SMBS need it, MSPS can provide itInformation security  SMBS need it, MSPS can provide it
Information security SMBS need it, MSPS can provide it
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 

Similar to Mhdscs2019 v049n03 010

Transforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence SharingTransforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence SharingEMC
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadsavassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldEMC
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfkelyn Technology
 
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdfStrengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdfEnterprise Insider
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...theindustryviewmagaz
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALMichael Bunn
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesEMC
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...BusinessBerg
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 

Similar to Mhdscs2019 v049n03 010 (20)

Transforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence SharingTransforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence Sharing
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdf
 
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdfStrengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Securing Wearable Device Data
Securing Wearable Device DataSecuring Wearable Device Data
Securing Wearable Device Data
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing Processes
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
Cybersecurity in the Digital Era_ Protecting Your Business from Cyber Threats...
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 

More from Turlough Guerin GAICD FGIA

How to work with petroleum hydrocarbon suppliers to reduce and eliminate cont...
How to work with petroleum hydrocarbon suppliers to reduce and eliminate cont...How to work with petroleum hydrocarbon suppliers to reduce and eliminate cont...
How to work with petroleum hydrocarbon suppliers to reduce and eliminate cont...Turlough Guerin GAICD FGIA
 
Harvard x Course Notes - Technology Entrepreneurship: Lab to Market
Harvard x Course Notes - Technology Entrepreneurship: Lab to MarketHarvard x Course Notes - Technology Entrepreneurship: Lab to Market
Harvard x Course Notes - Technology Entrepreneurship: Lab to MarketTurlough Guerin GAICD FGIA
 
Using Telecommunications to Reduce Your Organisation's Carbon Footprint
Using Telecommunications to Reduce Your Organisation's Carbon FootprintUsing Telecommunications to Reduce Your Organisation's Carbon Footprint
Using Telecommunications to Reduce Your Organisation's Carbon FootprintTurlough Guerin GAICD FGIA
 
Precincts to Support the Delivery of Zero Energy
Precincts to Support the Delivery of Zero EnergyPrecincts to Support the Delivery of Zero Energy
Precincts to Support the Delivery of Zero EnergyTurlough Guerin GAICD FGIA
 
Are your sustainability projects resonating with the business?
Are your sustainability projects resonating with the business?Are your sustainability projects resonating with the business?
Are your sustainability projects resonating with the business?Turlough Guerin GAICD FGIA
 
Harvardx - Technology Entreprenuership - Lab to Market
Harvardx - Technology Entreprenuership - Lab to MarketHarvardx - Technology Entreprenuership - Lab to Market
Harvardx - Technology Entreprenuership - Lab to MarketTurlough Guerin GAICD FGIA
 
Foundations for Net Zero Target Setting Using a Science Based Approach
Foundations for Net Zero Target Setting Using a Science Based ApproachFoundations for Net Zero Target Setting Using a Science Based Approach
Foundations for Net Zero Target Setting Using a Science Based ApproachTurlough Guerin GAICD FGIA
 
Health of-the-australian-construction-industry-research-report
Health of-the-australian-construction-industry-research-reportHealth of-the-australian-construction-industry-research-report
Health of-the-australian-construction-industry-research-reportTurlough Guerin GAICD FGIA
 

More from Turlough Guerin GAICD FGIA (20)

Climate Risk Governance Guide
Climate Risk Governance GuideClimate Risk Governance Guide
Climate Risk Governance Guide
 
Australian Bushfire Climate Plan
Australian Bushfire Climate PlanAustralian Bushfire Climate Plan
Australian Bushfire Climate Plan
 
How to work with petroleum hydrocarbon suppliers to reduce and eliminate cont...
How to work with petroleum hydrocarbon suppliers to reduce and eliminate cont...How to work with petroleum hydrocarbon suppliers to reduce and eliminate cont...
How to work with petroleum hydrocarbon suppliers to reduce and eliminate cont...
 
Harvard x Course Notes - Technology Entrepreneurship: Lab to Market
Harvard x Course Notes - Technology Entrepreneurship: Lab to MarketHarvard x Course Notes - Technology Entrepreneurship: Lab to Market
Harvard x Course Notes - Technology Entrepreneurship: Lab to Market
 
The Rise of Megaprojects
The Rise of MegaprojectsThe Rise of Megaprojects
The Rise of Megaprojects
 
Using Telecommunications to Reduce Your Organisation's Carbon Footprint
Using Telecommunications to Reduce Your Organisation's Carbon FootprintUsing Telecommunications to Reduce Your Organisation's Carbon Footprint
Using Telecommunications to Reduce Your Organisation's Carbon Footprint
 
Bringing Embodied Carbon Upfront
Bringing Embodied Carbon UpfrontBringing Embodied Carbon Upfront
Bringing Embodied Carbon Upfront
 
A New Choice Australias Climate for Growth
A New Choice Australias Climate for GrowthA New Choice Australias Climate for Growth
A New Choice Australias Climate for Growth
 
Roadmap Reducing Food Waste
Roadmap Reducing Food WasteRoadmap Reducing Food Waste
Roadmap Reducing Food Waste
 
Building the Case-for Net Zero
Building the Case-for Net ZeroBuilding the Case-for Net Zero
Building the Case-for Net Zero
 
PWC State of Climate Tech 2020
PWC State of Climate Tech 2020PWC State of Climate Tech 2020
PWC State of Climate Tech 2020
 
First Low Emissions Technology Statement 2020
First Low Emissions Technology Statement 2020First Low Emissions Technology Statement 2020
First Low Emissions Technology Statement 2020
 
The Next Normal in Construction
The Next Normal in Construction The Next Normal in Construction
The Next Normal in Construction
 
Helping Australia Bounce Back
Helping Australia Bounce BackHelping Australia Bounce Back
Helping Australia Bounce Back
 
Sustainable Finance Industry Guide
Sustainable Finance Industry GuideSustainable Finance Industry Guide
Sustainable Finance Industry Guide
 
Precincts to Support the Delivery of Zero Energy
Precincts to Support the Delivery of Zero EnergyPrecincts to Support the Delivery of Zero Energy
Precincts to Support the Delivery of Zero Energy
 
Are your sustainability projects resonating with the business?
Are your sustainability projects resonating with the business?Are your sustainability projects resonating with the business?
Are your sustainability projects resonating with the business?
 
Harvardx - Technology Entreprenuership - Lab to Market
Harvardx - Technology Entreprenuership - Lab to MarketHarvardx - Technology Entreprenuership - Lab to Market
Harvardx - Technology Entreprenuership - Lab to Market
 
Foundations for Net Zero Target Setting Using a Science Based Approach
Foundations for Net Zero Target Setting Using a Science Based ApproachFoundations for Net Zero Target Setting Using a Science Based Approach
Foundations for Net Zero Target Setting Using a Science Based Approach
 
Health of-the-australian-construction-industry-research-report
Health of-the-australian-construction-industry-research-reportHealth of-the-australian-construction-industry-research-report
Health of-the-australian-construction-industry-research-report
 

Recently uploaded

Top 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxTop 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxdishha99
 
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779Delhi Call girls
 
best weekend places near delhi where you should visit.pdf
best weekend places near delhi where you should visit.pdfbest weekend places near delhi where you should visit.pdf
best weekend places near delhi where you should visit.pdftour guide
 
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking MenDelhi Call girls
 
Genesis 1:6 || Meditate the Scripture daily verse by verse
Genesis 1:6  ||  Meditate the Scripture daily verse by verseGenesis 1:6  ||  Meditate the Scripture daily verse by verse
Genesis 1:6 || Meditate the Scripture daily verse by versemaricelcanoynuay
 
08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking MenDelhi Call girls
 
How to Get Unpublished Flight Deals and Discounts?
How to Get Unpublished Flight Deals and Discounts?How to Get Unpublished Flight Deals and Discounts?
How to Get Unpublished Flight Deals and Discounts?FlyFairTravels
 
char Dham yatra, Uttarakhand tourism.pptx
char Dham yatra, Uttarakhand tourism.pptxchar Dham yatra, Uttarakhand tourism.pptx
char Dham yatra, Uttarakhand tourism.pptxpalakdigital7
 
Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236Sherazi Tours
 
08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking Men08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking MenDelhi Call girls
 
BERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxBERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxseri bangash
 
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...Apsara Of India
 
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh HaldighatiApsara Of India
 
Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236Sherazi Tours
 

Recently uploaded (20)

Top 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxTop 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptx
 
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779
 
Call Girls Service !! Indirapuram!! @9999965857 Delhi 🫦 No Advance VVVIP 🍎 S...
Call Girls Service !! Indirapuram!! @9999965857 Delhi 🫦 No Advance  VVVIP 🍎 S...Call Girls Service !! Indirapuram!! @9999965857 Delhi 🫦 No Advance  VVVIP 🍎 S...
Call Girls Service !! Indirapuram!! @9999965857 Delhi 🫦 No Advance VVVIP 🍎 S...
 
best weekend places near delhi where you should visit.pdf
best weekend places near delhi where you should visit.pdfbest weekend places near delhi where you should visit.pdf
best weekend places near delhi where you should visit.pdf
 
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
 
Rohini Sector 18 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 18 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 18 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 18 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Munirka 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Munirka 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Munirka 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Munirka 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Genesis 1:6 || Meditate the Scripture daily verse by verse
Genesis 1:6  ||  Meditate the Scripture daily verse by verseGenesis 1:6  ||  Meditate the Scripture daily verse by verse
Genesis 1:6 || Meditate the Scripture daily verse by verse
 
08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men
 
08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men
 
How to Get Unpublished Flight Deals and Discounts?
How to Get Unpublished Flight Deals and Discounts?How to Get Unpublished Flight Deals and Discounts?
How to Get Unpublished Flight Deals and Discounts?
 
char Dham yatra, Uttarakhand tourism.pptx
char Dham yatra, Uttarakhand tourism.pptxchar Dham yatra, Uttarakhand tourism.pptx
char Dham yatra, Uttarakhand tourism.pptx
 
Call Girls Service !! New Friends Colony!! @9999965857 Delhi 🫦 No Advance VV...
Call Girls Service !! New Friends Colony!! @9999965857 Delhi 🫦 No Advance  VV...Call Girls Service !! New Friends Colony!! @9999965857 Delhi 🫦 No Advance  VV...
Call Girls Service !! New Friends Colony!! @9999965857 Delhi 🫦 No Advance VV...
 
Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236
 
08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking Men08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking Men
 
BERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxBERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptx
 
Call Girls 🫤 Connaught Place ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ...
Call Girls 🫤 Connaught Place ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ...Call Girls 🫤 Connaught Place ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ...
Call Girls 🫤 Connaught Place ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ...
 
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
 
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati
 
Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236Visa Consultant in Lahore || 📞03094429236
Visa Consultant in Lahore || 📞03094429236
 

Mhdscs2019 v049n03 010

  • 1. Why businesses must take a risk management approach to supply chain security ILAN RUBIN O rganisations that use supply chains need to be aware of the cybersecurity risks created by vulnerabilities in upstream or downstream partners. Often, the lack of security is unintentional. A supplier may unknowingly leave security gaps in information, which is then incorporated into the organisations’ systems and may be exploited by malicious hackers. It’s essential for organisations to work closely with their supply chain partners to overcome these challenges, and to secure the supply chain. Chief information security officers (CISO) and other leaders responsible for security can be forgiven for being frustrated by their limited control over supply chain activities. Supply chains tend to be dynamic, highly complex, and fluid. And with no easy way to predict where an attack might come from, this makes the job of securing the organisation even harder. This challenge is equally confounding for small and large businesses. While small organisations don’t tend to have the required resources to conduct due diligence throughout the supply chain, large organisations tend to have such disparate and complex supply chains that conducting due diligence is similarly challenging. However, the more complex the supply chain, the more important it is to have a strong security foundation. And, even though CISO can’t necessarily control all the actions of supply chain partners, they’re still responsible for securing the organisation, so they must pay careful attention to the supply chain. CISO should start by creating a risk management plan pertaining to the supply chain before determining on what areas to focus and where some risk may be acceptable. Characterising risk based on its consequences is a useful way of determining what is acceptable and what must be mitigated. Organisations can then start to plan their security measures. Organisations should protect information based on its value. This means it can segment its assets to protect the crown jewels more effectively and without wasting resources. This approach can also restrict the scope or spread of compromised supply chain systems. Open up a conversation with all partners about supply chain risks and security best practices to ensure that everyone in the supply chain is working towards the same goal of security. This can help overcome factors such as human error, which is often a significant contributor to data breaches. Just by being aware of the need for security best practices, organisations can reduce the risk of people inadvertently creating vulnerabilities. While mitigating the risks across the supply chain can seem overwhelmingly difficult, it is essential to take a risk management approach that minimises the dangers. This might involve incorporating a security fabric approach, which delivers broad protection and visibility to every network segment, device, and appliance, whether virtual, in the cloud, or on-premises. Ilan Rubin is the managing director of Wavelink, distributor of Fortinet security applications. For more information email sales@wavelink.com.au, call +61 3 9832 4444 or visit www.wavelink.com.au. ■ MANAGE RISK 10 | MHD MAY / JUNE 2019 MHD COMMENT