Welcome to the new Energy Central — same great community, now with a smoother experience. To login, use your Energy Central email and reset your password.

Sun, Oct 20

Supply Chain Cybersecurity Beyond Vendor Risk Management

The suggestions made in this article (Read More below) are part of the paradigm shift to implementing holistic "Cyber Risk Management" best practices in support of business risk management to combat modern cybercrime.

No proficient hacker attacks the strongest point of protection. Hackers are smart, they conduct reconnaissance to find the weakest point, which is frequently a party in the supply chain with access to sensitive systems and broad access to critical infrastructure. That's who the hackers go after when critical infrastructure operations are their ultimate target.  

"Ultimately, securing the supply chain is not just about protecting your vendors — it's about safeguarding your entire business ecosystem. "

Keep in mind that we do not have to do anything proactive to prevent cyber risks from becoming an actual cyber attack that causes harm; we can accept the risk, just like Captain Smith did with the Titanic when he was warned of icebergs in the area. But, just like Captain Smith, we will need to deal with the consequences of our actions/decisions, if we do become victims of a cyber-crime. Keep that Bitcoin account open, just in case you need to pay the ransom.