The article discusses how an organization can adopt an information-centric approach to protect its information shared in one or more supply chains; clearly communicate the expectations it has for a direct (Tier 1) supplier to protect information; and use contracts and measurement to maintain the protection desired. Building on this foundation, the concept of resilience -- and that of cyber-resilience -- is discussed, and how an information-centric approach can assist in creating a more cyber-resilient supply chain. Finally, the article concludes with five steps an organization can take to improve the protection of its information: i) map the supply chain; ii) build capability; iii) share information and expertise; iv) state requirements across the supply chain using standards, common frameworks, and languages; and v) measure, assess, and audit. [ABSTRACT FROM AUTHOR]
CITATION STYLE
Davis, A. (2015). Building Cyber-Resilience into Supply Chains. Technology Innovation Management Review, 5(4), 19–27. https://doi.org/10.22215/timreview887
Mendeley helps you to discover research relevant for your work.