Sales

Managing Risk in the Supply Chain

Categories
Published
of 10
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Description
Managing Risk in the Supply Chain Moderator: Derek Harp, ICS Security, SANS Institute Panelists: Nadya Bartol, VP Industry Affaires and Cybersecurity Strategist UTC Samara Moore, Senior Manager CIP Security
Transcript
Managing Risk in the Supply Chain Moderator: Derek Harp, ICS Security, SANS Institute Panelists: Nadya Bartol, VP Industry Affaires and Cybersecurity Strategist UTC Samara Moore, Senior Manager CIP Security and Compliance Exelon Melanie Seader, Senior Cyber and Infrastructure Security Analyst EEI Doug Wylie, Director Industrial Security Program, Rockwell Automation Copyright 2013 Rockwell Automation, Inc. All rights reserved. 2 Supply Chain Risks Affect ICS Security Incapacity or destruction may have a debilitating impact on security, national economic security, national public health or safety... Added Potential Impacts Personal safety (employees and operators) Loss or damage to physical assets Regulatory fines for non-compliance Disturbances to manufacturing schedules Theft of intellectual property and know-how Reputational damage (brand image) Managing Supply Chain Cyber Security Risks Process - Risk based approach - Enterprise policy - Establish security requirements - Incorporating terms and conditions into contracts - Consistent evaluation of security req Technology - Understand connectivity - Architecture, design to reduce risk - Monitor changes and anomalous activity People - Involves all stakeholders: IT, Security, Legal, Procurement, Business Units - Training - Ensure following policy and process - Follow through with ensuring supply chain requirements are met and periodic evaluations Available Resources - DHS Cyber Security Procurement Language for Control Systems - Cybersecurity Procurement Language for Energy Delivery Systems - EPRI Cybersecurity Procurement Requirements Traceability Process Example: Consistent Evaluation of Requirements Technology Example: Security Architecture Managing Cyber Supply Chain Risk Cyber supply chain risk management is a shared responsibility Managing cyber supply chain risk requires cross-functional coordination Managing cyber supply chain risk is a continuous process Information and communication technology (ICT) must be built using secure development practices Cybersecurity must be built into ICT systems Cybersecurity must be verified throughout the lifecycle of ICT From The World Is Flat by Thomas Friedman Dell Inspiron 600m Notebook: Key Components and Suppliers 2014 Utilities Telecom Council Source: Booz Allen Hamilton and DoD 7 7 Everybody has a supply chain except for god Supplier s Supplier s Suppliers Suppliers Suppliers Supplier Acquirer Customer End Customer (Consumer) Tier 3... Tier 2 Tier 1 Upstream Organization Downstream From Sourcing to Completion ISO/IEC : 2013 Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts 2014 Utilities Telecom Council 8 We are all in this together The number of breaches attributed to business partners remained flat since 2007 At the same time the number of breaches attributed to external threat increased tenfold, from roughly 100 (same as partners) to over 1000 in 2013 Proportion of all breaches attributed to business partners decreased since 2007 to a negligible number Proportion of all breaches attributed to external threat increased from approximately 40% to about 90% Utilities Telecom Council 9 Industry Government Standards and practices are there to help figure it out Comprehensive National Cybersecurity Initiative 2008 DoD ICT SCRM Key Practices Document Cyberspace Policy Review NIST IR 7622, Notional Supply Chain Risk Management Practices for Federal Information Systems The President s International Strategy for Cyberspace GAO Report PMOs developed in DOJ and DOE DHS ICT Supply Chain Exploits Frame of Reference NIST SP DHS Vendor Procurement Language SAFECode Software Supply Chain Integrity papers IEC Requirements for IACS Solution Suppliers ISO/IEC Guidelines for Information Security in Supplier Relationships Cybersecurity Procurement Language for Energy Delivery Systems SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) Open Trusted Technology Framework and Conformity Assessments 2014 Utilities Telecom Council 10
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks