Building Cyber-Resilience into Supply Chains

  • Davis A
N/ACitations
Citations of this article
93Readers
Mendeley users who have this article in their library.

Abstract

The article discusses how an organization can adopt an information-centric approach to protect its information shared in one or more supply chains; clearly communicate the expectations it has for a direct (Tier 1) supplier to protect information; and use contracts and measurement to maintain the protection desired. Building on this foundation, the concept of resilience -- and that of cyber-resilience -- is discussed, and how an information-centric approach can assist in creating a more cyber-resilient supply chain. Finally, the article concludes with five steps an organization can take to improve the protection of its information: i) map the supply chain; ii) build capability; iii) share information and expertise; iv) state requirements across the supply chain using standards, common frameworks, and languages; and v) measure, assess, and audit. [ABSTRACT FROM AUTHOR]

Cite

CITATION STYLE

APA

Davis, A. (2015). Building Cyber-Resilience into Supply Chains. Technology Innovation Management Review, 5(4), 19–27. https://doi.org/10.22215/timreview887

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free