{"id":11318,"date":"2021-04-12T23:48:28","date_gmt":"2021-04-13T03:48:28","guid":{"rendered":"https:\/\/www.certitrek.com\/nlpa\/?page_id=11318"},"modified":"2021-09-28T10:29:51","modified_gmt":"2021-09-28T14:29:51","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.certitrek.com\/nlpa\/news\/purchasing-articles\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"

Procurement and Cyber Security<\/h3><\/div><\/div><\/div>

PurchTips edition #440<\/p>\n<\/div>

What Procurement Professional Need to Know in 2019<\/h4><\/div><\/div><\/div>

Cyber Security is an at front and center of the modern supply chain thought processes.\u00a0Procurement Professionals\u00a0are required to ensure that their organizations are protected from risks that impact their ability to manage to spend and support operations. The management of spend, support of operations, and shielding organizations from risks is the mission of procurement departments, the reason for their existence.<\/p>\n

\"\"<\/p>\n

The\u00a0Procurement Function<\/a>\u00a0is responsible for ensuring a consistent supply of raw material inputs to be utilized by their own conversion or manufacturing processes to produced useful outputs, products, and services that customers are willing to pay for. Cyber Threats can be present in all these activities and can come from all stakeholder groups. Therefore, Cyber Threats can come from internal and external (suppliers, partners, customers) sources.<\/p>\n

What are at risks at hand?<\/em>\u00a0Everything, corporate secrets, mission-critical recipes, formulas, process data breaches, metrics, sensitive customer information breaches, financial data breaches, lawsuits, brand damage, loss of goodwill, crippling supply chain disruption, and so on.<\/p>\n

Procurement Professionals must acquire the skills to collaborate with their IT Departments to do the following:<\/p>\n

    \n
  1. Identify Points of Cyber Attack in supply chain processes<\/strong>\u00a0which are the most impactful. The key is to understand the severity of threats, the total number of current intrusions, and the ability of current defense mechanism to detect and neutralize cyber threats<\/li>\n
  2. Leverage Computer Hardening processes<\/strong>\u00a0which create buffer zones around IT systems to shield them from cyber-attacks. A major component of this is to ensure that all activities that do not create value for a business should be curtailed to reduce the probability of cyber-attack<\/li>\n
  3. Audit supplier cyber security capability<\/strong>\u00a0to determine the degree of risks they pose to the buying organizations. Audits include supplier selection processes and ongoing performance monitoring processes<\/li>\n
  4. Deploy a Cyber Threat Response Plan<\/strong>\u00a0which provides protocol on what constitutes a cyber-attack occurs, who is responses, when, where, and how to respond.<\/li>\n
  5. Hold procurement staff accountable for cybersecurity processes in their sphere<\/strong>. This is best done when integrated into the performance criteria of the procurement staff. The idea is to create a\u00a0Pocket of Cyber Security Excellence<\/em>\u00a0within the Procurement Organization.<\/li>\n<\/ol>\n

    The\u00a0Better Business Bureau\u00a0recommends that managers tell their employees the following:<\/strong><\/p>\n