CONNECTING THE DEFENCE COMMUNITY WITH INSIGHT, INTELLIGENCE & OPPORTUNITIES

Officially Supported By: Defence Contracts International Supply2Defence

Official Media Partners for:

Writing for Defence Online, Rodney Joffe, Senior Vice President, Security CTO and Fellow Neustar and Chairman Neustar International Security Council discusses the importance of supply chain security

In October, international aerospace pioneer, Airbus, was forced to act after being hit by a series of cyber-attacks that targeted its suppliers. Thought to be Chinese state-sponsored, the attacks resulted in hackers gaining access to sensitive supply chain data. The end goal was to infiltrate the entire Airbus network, by pinpointing and compromising vulnerable third-party VPNs – a tactic that had potential to wreak havoc on not only Airbus, but also its multiple providers and customers.

At any given time, the threat of a third party cyber-attack is enough to evoke great concern amongst cyber workers, however, when national security and military documentation is at stake, the situation immediately intensifies. Unfortunately, these risks are not confined to the defence industry alone.

Supply chain security is becoming a leading concern globally, highlighted by recent research from the Neustar International Security Council.  When asked, nine in ten cyber security professionals, operating across a range of sectors, admitted they are worried about their third party suppliers getting hacked. While these worries may be unsurprising given today’s unsettled security landscape, more shocking is the revelation that only 24 percent of respondents admitted to feeling confident with the prevention barriers they have put in place to guard against these types of attacks.

A major reason for these concerns is that effectively securing a supply chain end-to-end is a complex and constantly evolving challenge, made even more complicated by the increasing uptake in digital transformation initiatives and the explosion of Internet of Things (IoT) devices. More third parties are connecting to an organisation’s network than ever before, and in turn, threat levels are dramatically rising.

With every new device and network adding endless access points for malicious actors, guarding against supply chain attacks requires adopting a “zero trust” approach, revolving around organisations questioning the security of their whole digital network, including that of the third parties they work with.

An increasing cyberattack surface

The growing risk around supply chain security is not without explanation. As more organisations undergo the process of digital transformation to meet the fast pace of change, they are increasingly dependent on third party service providers to support and drive innovation. Whether it be through deploying a cloud platform, automation solution, business intelligence tool, or even by outsourcing work to a manufacturer or software company as opposed to building in-house, the number of providers that businesses work with is only set to rise.

While relying on third parties is key for improving agility and streamlining processes, it also increases the number of digital links to an organisation, which in turn significantly increases the potential for risk. What’s more, the continuous explosion of the IoT poses similar questions around supply chain security. In most cases, these IoT devices have been built by third party manufacturers meaning that the companies actually using them do not have the knowledge of how they have been created or what security measures they have embedded into them.

As a result of this expanded attack surface, malicious actors are now finding alternative ways to penetrate networks. And, as demonstrated in the case of Airbus, third party access points are seen as a weak link for launching attacks.

Adopting a “zero trust” approach

To ensure a safe and secure supply chain, businesses must establish a “zero trust” approach with their providers. This concept is based on the fundamental realisation that there is no such thing as perfect security. Ultimately, an organisation could do everything right when it comes to cybersecurity – by deploying the correct protocols and tools for example – but they are only as secure as their third party suppliers.

“Zero trust” requires security and procurement teams to conduct a thorough risk assessment of their organisation’s supply chain from the outset. Its vitally important that this method is applied to every vendor connecting to the network, from service providers to the electronic devices used within the office including laptops and smart systems.

The importance of standards

During the auditing process, security teams should be making informed decisions based on tangible evidence before bringing an organisation into the ecosystem. This goes beyond a having an initial conversation with a potential supplier. It means ensuring that they closely follow an industry best practice cybersecurity checklist – and that this checklist is validated and authenticated. With this, companies need to pay close attention to industry accreditations and standards and verify that the supplier is adhering to these. If a vendor doesn’t have these standards, then it is more difficult to understand the risks.

Within the defence industry, governments across the globe are doubling down on supply chain security compliance, especially as hackers are now targeting industrial control systems through third parties. For example, in 2017 the US government launched its first cybersecurity executive order stating that all US federal agencies were required to use the National Institute for Cybersecurity and Standards (NIST) cybersecurity framework, and not long after supply chain specifications were added to this framework. What’s more, the US Department of Defence recently announced its cybersecurity enforcement model, the Cybersecurity Maturity Model Certification, meaning that the stakes of non-compliance are higher than ever.

While organisations should continuously adopt their own, always-on approach to security, only by conducting rigorous and ongoing assessment can they be confident that their suppliers take security as seriously they do. Ultimately, missed connections or weak links can cause lasting damage to an organisation’s bottom line, leaving no room for error.

To learn more about cyber security and how your business can stay protected from threats, visit the Cyber Essentials Online website.

If you would like to join our community and read more articles like this then please click here.

 

Neustar Rodney Joffe supply chain security

Post written by: Matt Brown


LATEST STAKEHOLDER

Become a Stakeholder today and benefit from an exclusive marketing package which will allow you to:

  • Engage with active defence buyers and key supply chain partners
  • Create your own branded micro-site which within Defence Online which is managed by you
  • Have a dedicated Digital Account Manager to help enhance your Stakeholder page
  • Promote your news, products, press releases, eBooks and Videos as a Defence Online partner which feeds through to our homepage and social media channels
  • Have your company promoted on our partner website Defence Contracts Online (DCO)
  • All news promoted in mynewsdesk, a major hub for all of our news articles which enables news to be picked up from trade magazines, national newspapers and many other publications which offers extra exposure at no additional cost!

Contact us today or call us on 0845 557 1315 to take advantage of this exclusive marketing package


.

RELATED ARTICLES

the MoD has several challenges to negotiate as it looks to invest in upgrading its accommodation

April 26, 2024

Homeland - Armed forces accommodation is about to move up a rank

As part of the Ministry of Defence’s (MoD) Modernised Accommodation Offer (MAO), armed forces personnel are due to benefit from

A military laser DragonFire could boost the UK Armed Forces with greater accuracy while reducing the reliance on high-cost ammunition.

April 25, 2024

Homeland - New procurement rules help rapid fitting of military laser

The cutting-edge DragonFire laser will be installed on Royal Navy warships for the first time from 2027 – far quicker