Supply Chain World Volume 12 Issue 4 | Page 19

__________________________________________________________________________________________________
Cybersecurity along with human manipulation. Supply chain firms and their natural dependency on other organizations as part of their business model leave them open to attacks as they inherently have numerous risks and weak points, many that will be outside of their direct control. This is why it is important that these supply chain firms understand the risks that are within their direct control and have the correct and required safeguards and controls in place to manage and reduce these risks.
Some examples of areas to focus on include software weaknesses, internal misconfigurations and lapses in access control, limited oversight of supplier and partner activities, poor employee security training, and inadequate vetting of third-party vendors and their security processes.
In many cases, companies can rely on penetration testing to tighten up their security postures. However, one of these above weaknesses requires additional planning and insight.
The weakest link: thirdparty and vendor risks
Regardless of how robust a company’ s security posture may be, if it is reliant on or partnered with a third-party vendor or supplier that has
scw-mag. com 19