In this video, explore how giving procurement, commercial, data protection, and operations teams cybersecurity responsibilities can help your business integrate cybersecurity into your supply chain interactions.
- [Instructor] Many people now talk about cybersecurity … in terms of developing a culture within the organization … instead of simply setting rules … and implementing technology. … Part of that is reevaluating … where people are making decisions … about security implementation in the business. … But isn't cybersecurity just an IT problem? … The traditional way of viewing security … is that, once given a budget, … it's something that can be handed … to the IT team, and forgotten, … without much thought from other functions, … from marketing to operations, … who are just using the technology they're given. … But cybersecurity is cross-disciplinary, … and supply chain security even more so. … Security, identifying requirements, … making decisions, and implementing them, … is now embedded in a wide variety of roles. … Obviously, the IT and security teams … still play a significant role … in defining the security architecture, … the technical aspects of the system, … and incident detection and response processes. …
- Recognize how business and technology together create a supply chain cybersecurity problem.
- Identify how cybersecurity defines and maintains boundaries.
- Analyze how common cybersecurity practices compare to supply chain security issues.
- Give examples of how cybersecurity is implemented throughout an organization.
- Differentiate between prescriptive-based requirements and goal-based cybersecurity, with an identified supply chain risk.
- Provide evidence for why communicating about cybersecurity between businesses can be daunting.