The Nuances of Physical Security and Supply Chain Management

Logo
Presented by

Ernie Hayden, Founder & Principal | 443 Consulting LLC

About this talk

When you think about it, supply chain security surfaced as an important focus in the wake of several significant events that highlighted vulnerabilities in global supply chains. These events began with the 9/11 attacks in 2001 resulting in a heightened focus on national security - including the security of supply chains. Subsequently, we had high-profile product recalls and quality issues - such as contaminated foods and counterfeit drugs - again raising concerns about supply chain security. Additionally, we also had an increasing reliance on digital systems and technology in supply chains that were made more vulnerable due to cyber threats. These events in conjunction with the rapid growth of globalization and outsourcing of manufacturing and sourcing activities to different areas of the globe increased the complexity and extended the geographic reach of supply chains. Hence, supply chain security -- including cyber and physical -- surfaced and required important focus. Join Ernie Hayden (Founder & Principal, 443 Consulting) to gain a better perspective of the physical security issues involved with the current global supply chain and get insights on how to overcome them. Key challenges discussed in the session include: - Unauthorized access to the supply chain and materials. - Inadequate surveillance of physical security of supply chain operations; and, - Transportation security weaknesses arising from inadequate packaging, lack of tracking and tracing mechanisms, or insufficient verification of drivers and personnel involved in the transportation process.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (784)
Subscribers (198128)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.