Share
How do you mitigate the risk to your Information Technology supply chain?  At what level is it being addressed and assessed (CTO, CIO, COO, CBO, CEO)?  How are you assured that the keyboard, mouse, cables, PC, laptop, tablet, smartphone, and their sub-components and then their software [...]"/>

Download (PDF, 1.07MB)


How do you mitigate the risk to your Information Technology supply chain?  At what level is it being addressed and assessed (CTO, CIO, COO, CBO, CEO)?  How are you assured that the keyboard, mouse, cables, PC, laptop, tablet, smartphone, and their sub-components and then their software are trustworthy?  It’s not simply fake Military parts from China or other countries it is a much larger problem then that.

You’d have no idea this was happening to you because we’re usually the one operating as the user.  And users often have some reason to balk at the time it takes to provide new equipment or allow a new piece of software.  Now the Security and Acquisition folks have plenty to apologize for but you may want to cut the a bit of slack.  It is a very difficult task, challenging environment, and is very rarely rewarded with anything but negative reviews and comments when things go alright or much worse if things go wrong.  

With all that said if you were in there shoes in this SH-60 case how would you handle it?  What would you do to prevent something like this in a global capitalist economy and supply chain?  And what would you do in the current environment where resources are very sparse?

[via The White House]

Update (22 MAY 2012) - Review the U.S. Senate Armed Service Committees’ report on the Inquiry into Counterfeit Electronic Parts in the Department of Defense Supply Chain (21MAY2012).

Incoming search terms:

national strategy for global supply chain security, global supply chain security and counterfeits, global supply chain security cyber

No related posts.

You may also like-

SUPPLY CHAIN SECURITY – DO YOU KNOW WHO YOUR INSIDERS ARE? [Cyber Defense]