Supply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom. Credit: Thinkstock Business continuity planning is an important but often overlooked aspect of managing enterprise risk. This year, the COVID-19 pandemic has made it clear to risk and security professionals—and their enterprises—that business continuity must be an organizational focal point, with supply chain continuity being an especially critical area to solidify.Many enterprises today outsource a variety of business- and technology-related processes, making successful and reliable supply chains essential for their survival. Eight in 10 (79%) of companies with high-performing supply chains achieve revenue growth above average within their industries. But maintaining that reliability in a fast-moving era of digital disruption requires a concerted commitment to assessing threats and managing gaps in continuity plans.While supply chain problems encountered during the COVID-19 pandemic are top of mind for many organizations, other major events in the not-too-distant past (from natural disasters to terrorist attacks and cyberattacks) have underscored the need for resilient supply chains. In fact, cybersecurity incidents increasingly are among the common causes of supply chain disruption. A study from Resilience360 finds that there were around 300 cybersecurity incidents that impacted supply chain entities last year, with many of those attacks coming in the form of ransomware. Assess your supply chain partners’ securityUnfortunately, attacks on supply chains is a trend that is likely to escalate in the months and years to come. Earlier this year, even before the COVID-19 pandemic took center stage, the US Federal Bureau of Investigation issued a security alert to companies in the private sector regarding a hacking campaign targeting supply chain software providers. The bottom line: inadequate security and incident management procedures within supply chain ecosystems can result in major interruptions to an enterprise’s business operations. Therefore, enterprises need to vet the security capabilities of their supply chain partners on an ongoing basis. This holds particularly true in the aftermath of the current pandemic and resulting economic fallout, as some suppliers might no longer be in the economic position to implement the security safeguards that they previously had in place. Whatever coordinating is done with existing suppliers, it is imperative in this era to rethink business models and enable a more digital enterprise by transforming products and services. As enterprises re-imagine themselves and how technology can best be leveraged to drive growth and innovation, their transformations will often lead them to engage with new vendors and suppliers. Suppliers can be categorized into four major groups: strategic, tactical, commodity and niche. Each group carries its own set of potential risks that need to be mitigated. For example, instead of relying upon only one supplier for commodities (suppliers of materials and parts), continuity can be bolstered by utilizing multiple suppliers, while niche suppliers of exclusive components require extra vetting if they are essential to the product’s distribution because they can be especially challenging to replace. Before entering into relationships with new supply chain partners, it is critical to understand their security capabilities and the impact any gaps could have on organizational cybermaturity and business continuity.Address the entire supply chainOf course, in addition to cybersecurity incidents represent, there are several other threats that can wreak havoc on supply chains, such as hardware and equipment failures, environmental hazards and other continuity crises, including the disruptions to the workforce that have occurred during the COVID-19 pandemic. As indicated in ISACA’s recent white paper, Supply Chain Resilience and Continuity, “A supply chain risk mitigation process should not just focus on supplier-specific risk, but rather address overall supply chain interruptions and their impact on the enterprise as a whole. The mitigation plan should address the entire supply chain rather than a specific supply partner. The risk mitigation process should be both proactive (to ensure adequate controls while establishing the process) and reactive (to include an appropriate incident management process supported by continuity plans).” [Disclaimer: I am a board director of ISACA.] The ISACA guidance highlights some key best practices in this area, including:Monitoring supply chain partners for performance and qualityAligning enterprise continuity plans with the plans of supply chain partnersAvoiding scenarios with single points of failure, ensuring redundancy where possibleUnderstanding and maintaining good working relationshipsWe are in a dynamic and sometimes tumultuous business landscape that presents enterprises with tremendous opportunities but also comes with increasing risks. This is a result of both the pace of technological change and a global business environment with increasing interdependencies. Add in the ever-present possibility of large-scale disasters such as a global pandemic, and the need to prioritize business continuity is evident.While organizations should always be prepared for the unexpected, the scale of the COVID-19 pandemic has been an eye-opener for many business leaders about the necessity of continuity planning and resilient, dependable supply chains. Planning in advance for what to do when a problem abruptly surfaces—and applying the risk management, governance and security fundamentals to mitigate the potential damage—should remain a high priority long after the current crisis abates. Related content feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff 30 Aug 2024 8 mins Technology Industry IT Skills Events news F5, Intel team up to boost AI delivery, security F5 and Intel are working together to combine security and traffic-management capabilities from F5’s NGINX Plus suite with Intel’s OpenVINO open-source toolkit for optimizing AI inference and Intel IPU hardware accelerators. By Michael Cooney 29 Aug 2024 1 min Network Security Artificial Intelligence Security news Cisco snaps up AI security player Robust Intelligence Plans call for integrating Robust Intelligence's AI security platform with Cisco Security Cloud to streamline threat protection for AI applications and models and increase visibility into AI traffic. By Ann Bednarz 28 Aug 2024 1 min Mergers and Acquisitions Artificial Intelligence Security feature What is OWASP? A standard bearer for better web application security The Open Web Application Security Project (OWASP) is an international nonprofit dedicated to providing free documentation, tools, videos, and forums for anyone interested in improving the security of their web applications. By Linda Rosencrance 28 Aug 2024 8 mins Internet Security IT Skills Application Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe