In this video, learn why SMEs/SMBs struggle to manage the challenging and conflicting requirements of their large customers.
- [Instructor] This is the second … of the supply chain security scenarios intended … to help you contextualize … the supply chain cybersecurity problem. … This time we're looking at small … to medium-sized businesses … who are trying to juggle the requirements passed onto them … by their customers. … The business's goal in this instance … is to manage the cybersecurity requirements received … from multiple customers. … This type of business will have far fewer customers, … perhaps 100 but possibly as few as 10. … You'd think that this simplifies the problem … but if all of these customers are larger … and they have their own requirements, … then suddenly cybersecurity becomes a full-time job. … The standardized and so inflexible requirements discussed … in our first example mean … that there are likely to be conflicts. … Different customers ask for different things, … so it becomes impossible to become compliant. … In addition, these requirements … are for securing risk to very large organizations. …
- Recognize how business and technology together create a supply chain cybersecurity problem.
- Identify how cybersecurity defines and maintains boundaries.
- Analyze how common cybersecurity practices compare to supply chain security issues.
- Give examples of how cybersecurity is implemented throughout an organization.
- Differentiate between prescriptive-based requirements and goal-based cybersecurity, with an identified supply chain risk.
- Provide evidence for why communicating about cybersecurity between businesses can be daunting.