SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
SESSION ID:
#RSAC
Integrating Cybersecurity Into
Supply Chain Risk Management
GRC-W03 Jon Boyens
Program Manager, Cyber SCRM
National Institute for Standards
and Technology
#RSAC
What does Cybersecurity Have to Do
with Supply Chains Anyway?
#RSAC
ICT and Non-ICT External Dependencies
ENTITY
Up
Stream
Non-
ICT
Partne
rs
Down
Stream
Non-
ICT
Partne
rs
ICT Supply Chain
(ICT Products & Services)
Non-ICT Products & Service
Non-ICT Products & Service
ICT Supply Chain (ICT Products &
Services)
TRUST
-Organization
-Process
-Products/Service
But Verify
-Due Diligence
-Standards/Audits
-Testing
3
#RSAC
Anatomy of Cyber Supply Chain Risk
Inbound Supply Chain:
Risks from Suppliers
Unwanted Functionality
Info/Network Breaches
Supplier Insider Threats
Manufacturing/
SC Risks
Theft/alteration of data
Compromise of SC business SW
Compromise of control
systems, test or other
equipment.
Disruptions in vetted suppliers
Outbound Supply
Chain
Theft/Tampering
Counterfeits
Product Design
Design Flaws
4
#RSAC
How Did We Get Here?
Cyber
• Growing sophistication of ICT
• Number and scale of information systems
• Increasing reliance on COTS
Supply
Chain
• Speed and scale of globalization
• Complex supply chain (logically long and geographically diverse)
Risk
• Significant increase in the number of entities who ‘touch’ products and services
• Natural disasters, poor product/service quality and poor security practices
Manag
ement
• Lack of visibility and understanding: how technology is developed, integrated and
deployed and practices to assure security.
• A lack of control of the decisions impacting the inherited risks and ability to
effectively mitigate those risks.
5
#RSAC
No End in Sight for Supply Chain Cyber Risks
Three trends are exacerbating cyber risks to supply chains:
 Internet of Things: everything is smart and interconnected
 IT-enabled Supply Chain Management: product and supply
chain data run on top of business software that connects supply
chains – and weak links abound globally
 3-D Printing: production is going viral and digital.
6
#RSAC
Cyber Supply Chain Risks Emerge At Every Stage
What Can Happen?
Delivery of poor quality, compromised or counterfeit products
that diminish brand reputation
Loss of intellectual property shared with supply chain partners
Access to company IT networks, customer information or
operational control systems through supplier access
Impact on revenues, brand reputation and shareholder value
7
#RSAC
What Does Supply Chain Have to Do with
Cyber Risks?
80% of all info breaches originate in the supply chain
45% of all cyber breaches were attributed to past partners
72% of companies do NOT have full visibility into their
supply chains
59% of companies do NOT have a process for assessing
cybersecurity of third party providers with which
they share data or networks
40% of attack campaigns targeted manufacturing and
service sectors (20% each).
8
#RSAC
Supply Chain Disruptions are Costly!
98% of manufacturers will experience a supply chain
disruption in the next 2 years (80% for all firms)
55% of disruptions cost over $25 million
53% of disruptions caused from unplanned IT/Comms outage
24% of disruptions caused from cyber attacks
22% of disruptions caused from data breaches
Need More?
9
#RSAC
What’s the Risk? For Example….
Supplier-provided keyboard software gave hackers access to
owner data on 600 million Samsung Galaxy phones
Supplier-provided advertising SW tampered with computer
security so that attackers could snoop on browser traffic on
Lenovo computers.
Poor information security by service suppliers led to data
breaches at Target, Home Depot, Goodwill….and many others.
10
#RSAC
Match the Supplier with the Compromised
Customer
Suppliers Customers
Maroochy
Cisco
Fiat/Jeep
T-Mobile
Data breach of Tech Certification firm exposed personnel
data on employees of client company
Hack of credit check database exposed new customer
PPI.
Supplier entertainment system enabled remote take-
over of controls in a car.
Uncancelled credentials of former contractor enabled
unauthorized sewage release from water treatment
plant.
11
#RSAC
Ask Yourself the Following
Can you identify the sub-tier suppliers for critical IT
components or software embedded in your products and
systems?
Is cyber risk part of vendor selection, management and audit?
Do you know what information or IT systems your vendors can
access?
Do you scrutinize vendor personnel practices?
12
#RSAC
And Most Importantly….
Does the IT Security Group participate in the
procurement process, vendor assessments and
vendor management?
What other groups should you be working with to
assure end-to-end cybersecurity?
13
#RSAC
What are best practices and tools to
manage supply chain cyber risks?
#RSAC
NIST Case Studies
Cisco
Boeing & Exostar
Schweitzer Engineering Laboratories
Exelon Corporation
John Deere
Intel Corporation
Smart Manufacturing Leadership
Coalition
Northrop Grumman Corporation
Fujitsu
FireEye
Dupont Crop Protection
Resilinc
Procter & Gamble
NetApp
Juniper Networks
Great River Energy
Utility Company
Communications Company
15
#RSAC
Findings from NIST Case Studies
Key Findings:
Existing tools to mitigate supply chain for quality,
integrity, security and continuity risks are also
relevant for cyber risks
Best practices and tools to mitigate cyber risks in the
supply chain are hiding in plain sight – often in other
parts of the company.
Synergies of solution are not well exploited.
16
#RSAC
Organizational Strategies to Manage Supply
Chain Cyber Risks
Many hands and different
functions affect cyber risks in
the supply chain.
Lack of communication and
cooperation creates risk blind
spots.
Sourcing
Security
QA
ERM R&D
ENG.
ITLegal
SC Risk Owners
17
#RSAC
Best SCRM Practice: Supply Chain Risk Council
Supply Chain Risk Councils bring together key players for a holistic
and end-to-end supply chain risk management strategy
18
#RSAC
Vendor Risk Assessment Tools
What? Risk ratings to assess and mitigate vendor performance
financial, security risks as well as corporate social responsibility
risks.
Synergies with Cyber Risks:
 Baseline security requirements for contracts
 Integrates security risks with other business risks in the up-front
selection process and ongoing audits.
19
#RSAC
Supply Chain Resiliency Tools
What? Databases identifying and mapping key suppliers at all
levels, components and critical chokepoints as well as prequalified
backup sources of supply and vendors
Synergies with Cyber Supply Chain Risk Management
Identifies lower tier suppliers
Validated sources of backup supply in the event of disruption,
reducing risk that poor quality or counterfeit goods enter SC.
20
#RSAC
Track and Trace Tools
What? Detailed information on parts and materials to ensure
quality, integrity and backstop warranties. Where it was built?
Who built it? What assembly line? What test station?
Cybersecurity Benefits
Visibility by part, supplier, production process down supply
chain
Anti-counterfeiting tools
Capability to distinguish between design flaws and deliberate
defects
21
#RSAC
Master Security Specification Framework
What? Master security specification customizes security
requirements to product, service or site.
Cybersecurity Benefits
Gives business units a full roadmap of security requirements
Eliminates inconsistencies across business units
Enables flexibility to deal with multiple supplier roles
22
#RSAC
Enterprise Risk Intelligence
What? Data collection center reviewing all sources, not just those
traditionally associated with information security
Server Event Logs Antivirus Logs
Endpoint Device Logs Personnel Information
Firewall Logs In-Scope Equipment
Data Collection &
Analysis
23
#RSAC
Resources: NIST Best Practice Case Studies
http://www.nist.gov/itl/csd/best-practices-in-cyber-
supply-chain-risk-management-october-1-2-2015.cfm
Disclaimer: "The identification of any commercial product or
trade name is included solely for the purpose of providing
examples of publicly-disclosed events, and does not imply any
particular position by the National Institute of Standards and
Technology."
24
#RSAC
Questions?
Jon Boyens
Program Manager, Cyber SCRM
National Institute for Standards and Technology
Jon.Boyens@nist.gov
Http://scrm.nist.gov
Thank
you!!

Weitere ähnliche Inhalte

Was ist angesagt?

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 

Was ist angesagt? (20)

Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
penetration testing
penetration testingpenetration testing
penetration testing
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 

Andere mochten auch

Use of ict for effective teaching and learning
Use of ict for effective teaching and learningUse of ict for effective teaching and learning
Use of ict for effective teaching and learning
Ajith Janardhanan T J
 
Role of IT in supply chain management
Role of IT in supply chain managementRole of IT in supply chain management
Role of IT in supply chain management
Neelam Yadav
 

Andere mochten auch (8)

Managing productions across Supply Chain
Managing productions across Supply ChainManaging productions across Supply Chain
Managing productions across Supply Chain
 
Physical Distribution process (Distribution Budgets)
Physical Distribution process (Distribution Budgets)Physical Distribution process (Distribution Budgets)
Physical Distribution process (Distribution Budgets)
 
Recruitment and competency based job interviewing
Recruitment and competency based job interviewingRecruitment and competency based job interviewing
Recruitment and competency based job interviewing
 
Material requirements planning & erp ppt @ bec doms
Material requirements planning & erp  ppt @ bec domsMaterial requirements planning & erp  ppt @ bec doms
Material requirements planning & erp ppt @ bec doms
 
Role of information Technology in Supply Chain Manageent
Role of information Technology in Supply Chain ManageentRole of information Technology in Supply Chain Manageent
Role of information Technology in Supply Chain Manageent
 
Use of ict for effective teaching and learning
Use of ict for effective teaching and learningUse of ict for effective teaching and learning
Use of ict for effective teaching and learning
 
Role of IT in supply chain management
Role of IT in supply chain managementRole of IT in supply chain management
Role of IT in supply chain management
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 

Ähnlich wie Integrating Cybersecurity into Supply Chain Risk Management

Company Profile
Company ProfileCompany Profile
Company Profile
3SC World
 
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
VannaSchrader3
 
Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08
kamensm02
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11PBSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P
VannaSchrader3
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 

Ähnlich wie Integrating Cybersecurity into Supply Chain Risk Management (20)

Cybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdfCybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdf
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
 
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Building an Effective Supply Chain Security Program
Building an Effective Supply Chain Security ProgramBuilding an Effective Supply Chain Security Program
Building an Effective Supply Chain Security Program
 
Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?
 
Penetration testing 5 reasons Why Organizations Should Adopt it
Penetration testing   5 reasons Why Organizations Should Adopt itPenetration testing   5 reasons Why Organizations Should Adopt it
Penetration testing 5 reasons Why Organizations Should Adopt it
 
Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Webinar misra and security
Webinar   misra and securityWebinar   misra and security
Webinar misra and security
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?
 
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11PBSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 

Mehr von Priyanka Aash

Mehr von Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Integrating Cybersecurity into Supply Chain Risk Management

  • 1. SESSION ID: #RSAC Integrating Cybersecurity Into Supply Chain Risk Management GRC-W03 Jon Boyens Program Manager, Cyber SCRM National Institute for Standards and Technology
  • 2. #RSAC What does Cybersecurity Have to Do with Supply Chains Anyway?
  • 3. #RSAC ICT and Non-ICT External Dependencies ENTITY Up Stream Non- ICT Partne rs Down Stream Non- ICT Partne rs ICT Supply Chain (ICT Products & Services) Non-ICT Products & Service Non-ICT Products & Service ICT Supply Chain (ICT Products & Services) TRUST -Organization -Process -Products/Service But Verify -Due Diligence -Standards/Audits -Testing 3
  • 4. #RSAC Anatomy of Cyber Supply Chain Risk Inbound Supply Chain: Risks from Suppliers Unwanted Functionality Info/Network Breaches Supplier Insider Threats Manufacturing/ SC Risks Theft/alteration of data Compromise of SC business SW Compromise of control systems, test or other equipment. Disruptions in vetted suppliers Outbound Supply Chain Theft/Tampering Counterfeits Product Design Design Flaws 4
  • 5. #RSAC How Did We Get Here? Cyber • Growing sophistication of ICT • Number and scale of information systems • Increasing reliance on COTS Supply Chain • Speed and scale of globalization • Complex supply chain (logically long and geographically diverse) Risk • Significant increase in the number of entities who ‘touch’ products and services • Natural disasters, poor product/service quality and poor security practices Manag ement • Lack of visibility and understanding: how technology is developed, integrated and deployed and practices to assure security. • A lack of control of the decisions impacting the inherited risks and ability to effectively mitigate those risks. 5
  • 6. #RSAC No End in Sight for Supply Chain Cyber Risks Three trends are exacerbating cyber risks to supply chains:  Internet of Things: everything is smart and interconnected  IT-enabled Supply Chain Management: product and supply chain data run on top of business software that connects supply chains – and weak links abound globally  3-D Printing: production is going viral and digital. 6
  • 7. #RSAC Cyber Supply Chain Risks Emerge At Every Stage What Can Happen? Delivery of poor quality, compromised or counterfeit products that diminish brand reputation Loss of intellectual property shared with supply chain partners Access to company IT networks, customer information or operational control systems through supplier access Impact on revenues, brand reputation and shareholder value 7
  • 8. #RSAC What Does Supply Chain Have to Do with Cyber Risks? 80% of all info breaches originate in the supply chain 45% of all cyber breaches were attributed to past partners 72% of companies do NOT have full visibility into their supply chains 59% of companies do NOT have a process for assessing cybersecurity of third party providers with which they share data or networks 40% of attack campaigns targeted manufacturing and service sectors (20% each). 8
  • 9. #RSAC Supply Chain Disruptions are Costly! 98% of manufacturers will experience a supply chain disruption in the next 2 years (80% for all firms) 55% of disruptions cost over $25 million 53% of disruptions caused from unplanned IT/Comms outage 24% of disruptions caused from cyber attacks 22% of disruptions caused from data breaches Need More? 9
  • 10. #RSAC What’s the Risk? For Example…. Supplier-provided keyboard software gave hackers access to owner data on 600 million Samsung Galaxy phones Supplier-provided advertising SW tampered with computer security so that attackers could snoop on browser traffic on Lenovo computers. Poor information security by service suppliers led to data breaches at Target, Home Depot, Goodwill….and many others. 10
  • 11. #RSAC Match the Supplier with the Compromised Customer Suppliers Customers Maroochy Cisco Fiat/Jeep T-Mobile Data breach of Tech Certification firm exposed personnel data on employees of client company Hack of credit check database exposed new customer PPI. Supplier entertainment system enabled remote take- over of controls in a car. Uncancelled credentials of former contractor enabled unauthorized sewage release from water treatment plant. 11
  • 12. #RSAC Ask Yourself the Following Can you identify the sub-tier suppliers for critical IT components or software embedded in your products and systems? Is cyber risk part of vendor selection, management and audit? Do you know what information or IT systems your vendors can access? Do you scrutinize vendor personnel practices? 12
  • 13. #RSAC And Most Importantly…. Does the IT Security Group participate in the procurement process, vendor assessments and vendor management? What other groups should you be working with to assure end-to-end cybersecurity? 13
  • 14. #RSAC What are best practices and tools to manage supply chain cyber risks?
  • 15. #RSAC NIST Case Studies Cisco Boeing & Exostar Schweitzer Engineering Laboratories Exelon Corporation John Deere Intel Corporation Smart Manufacturing Leadership Coalition Northrop Grumman Corporation Fujitsu FireEye Dupont Crop Protection Resilinc Procter & Gamble NetApp Juniper Networks Great River Energy Utility Company Communications Company 15
  • 16. #RSAC Findings from NIST Case Studies Key Findings: Existing tools to mitigate supply chain for quality, integrity, security and continuity risks are also relevant for cyber risks Best practices and tools to mitigate cyber risks in the supply chain are hiding in plain sight – often in other parts of the company. Synergies of solution are not well exploited. 16
  • 17. #RSAC Organizational Strategies to Manage Supply Chain Cyber Risks Many hands and different functions affect cyber risks in the supply chain. Lack of communication and cooperation creates risk blind spots. Sourcing Security QA ERM R&D ENG. ITLegal SC Risk Owners 17
  • 18. #RSAC Best SCRM Practice: Supply Chain Risk Council Supply Chain Risk Councils bring together key players for a holistic and end-to-end supply chain risk management strategy 18
  • 19. #RSAC Vendor Risk Assessment Tools What? Risk ratings to assess and mitigate vendor performance financial, security risks as well as corporate social responsibility risks. Synergies with Cyber Risks:  Baseline security requirements for contracts  Integrates security risks with other business risks in the up-front selection process and ongoing audits. 19
  • 20. #RSAC Supply Chain Resiliency Tools What? Databases identifying and mapping key suppliers at all levels, components and critical chokepoints as well as prequalified backup sources of supply and vendors Synergies with Cyber Supply Chain Risk Management Identifies lower tier suppliers Validated sources of backup supply in the event of disruption, reducing risk that poor quality or counterfeit goods enter SC. 20
  • 21. #RSAC Track and Trace Tools What? Detailed information on parts and materials to ensure quality, integrity and backstop warranties. Where it was built? Who built it? What assembly line? What test station? Cybersecurity Benefits Visibility by part, supplier, production process down supply chain Anti-counterfeiting tools Capability to distinguish between design flaws and deliberate defects 21
  • 22. #RSAC Master Security Specification Framework What? Master security specification customizes security requirements to product, service or site. Cybersecurity Benefits Gives business units a full roadmap of security requirements Eliminates inconsistencies across business units Enables flexibility to deal with multiple supplier roles 22
  • 23. #RSAC Enterprise Risk Intelligence What? Data collection center reviewing all sources, not just those traditionally associated with information security Server Event Logs Antivirus Logs Endpoint Device Logs Personnel Information Firewall Logs In-Scope Equipment Data Collection & Analysis 23
  • 24. #RSAC Resources: NIST Best Practice Case Studies http://www.nist.gov/itl/csd/best-practices-in-cyber- supply-chain-risk-management-october-1-2-2015.cfm Disclaimer: "The identification of any commercial product or trade name is included solely for the purpose of providing examples of publicly-disclosed events, and does not imply any particular position by the National Institute of Standards and Technology." 24
  • 25. #RSAC Questions? Jon Boyens Program Manager, Cyber SCRM National Institute for Standards and Technology Jon.Boyens@nist.gov Http://scrm.nist.gov Thank you!!