Threat actors are increasingly targeting extended supply chains and abusing client-supplier trust to conduct third-party compromise. Governments are concerned about targeted attacks against critical national infrastructures, where compromise can have significant adverse national consequences. In this paper we identify and review advice and guidance offered by authorities in the UK, US, and the EU regarding Cyber Supply Chain Risk Management (C-SCRM). We then conduct a review of sector specific guidance in the three regions for the chemical, energy, and water sectors. We assessed frameworks that each region’s sector offered organisations for C-SCRM suitability. Our results found a range of interpretations for “Supply Chain” that resul...
Supply chain security continues to be an overlooked field with consequences that can disrupt industr...
The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply...
This paper continues the prior research undertaken by Warren and Leitch (2009), in which a series of...
Supply chains are increasingly targeted by threat actors. Using a recent taxonomy, we contrast the d...
Reports on supply chains as major sources of cybersecurity threats. Companies and organizations incr...
Purpose: Despite growing research interest in cyber security, inter-firm based cyber risk studies ar...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...
As supply chains become more digital to reach new levels of global competitiveness, caveats from thi...
The same Information and Communication Technologies (ICT) that have contributed tremendously to the ...
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet...
Companies increasingly form interdependent relationships between contractors and sub-contractors tha...
Recognizing the need for effective cyber risk management processes across the supply chain, the AICP...
Cyber supply chain (CSC) provide an organization with the ability to align its business processes, i...
The world is currently strongly connected through both the internet at large, but also the very supp...
This paper provides the first large-scale data-driven analysis to evaluate the predictive power of d...
Supply chain security continues to be an overlooked field with consequences that can disrupt industr...
The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply...
This paper continues the prior research undertaken by Warren and Leitch (2009), in which a series of...
Supply chains are increasingly targeted by threat actors. Using a recent taxonomy, we contrast the d...
Reports on supply chains as major sources of cybersecurity threats. Companies and organizations incr...
Purpose: Despite growing research interest in cyber security, inter-firm based cyber risk studies ar...
PurposeThe purpose of this paper is to explore how companies approach the management of cyber and in...
As supply chains become more digital to reach new levels of global competitiveness, caveats from thi...
The same Information and Communication Technologies (ICT) that have contributed tremendously to the ...
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet...
Companies increasingly form interdependent relationships between contractors and sub-contractors tha...
Recognizing the need for effective cyber risk management processes across the supply chain, the AICP...
Cyber supply chain (CSC) provide an organization with the ability to align its business processes, i...
The world is currently strongly connected through both the internet at large, but also the very supp...
This paper provides the first large-scale data-driven analysis to evaluate the predictive power of d...
Supply chain security continues to be an overlooked field with consequences that can disrupt industr...
The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply...
This paper continues the prior research undertaken by Warren and Leitch (2009), in which a series of...