How Supply Chain Managers Can Mitigate Cyber-Attack Risk

Ensuring electronic data is accurate is critical to ensuring on time delivery

Subscriber: Log Out

Air and ocean cargo shippers can also play a proactive role in the war against cyber crime and terrorism, says Suzanne Richer, Director, Trade Advisory Practice, Amber Road. At the same time, she says, logistics managers can protect themselves and their supply chains.

“Ensuring electronic data is accurate is critical to ensuring on time delivery,” says Richer. “You can't get anything in or out of a country without data.”

Richer notes that Customs and Border Protection (CBP) captures data on importers and exporters today that trigger a compliance or cargo security review. The information shared electronically through carriers, forwarders and customs brokers is electronically evaluated based on CBP's risk model, and anomalies may result in a shipper's air or ocean cargo being held.

“Our greatest security issues revolve around understanding that terrorism evolves and changes, and acts of future terrorism are undeterminable,” she says.

According to Richer, one of the difficulties in all cargo security programs is that government validations of a company's security program are infrequent – at a minimum once every three or four years.

“Most people let things go until the next validation. Thus the program becomes ineffective, unmanaged and not part of the key metrics of validation,” she says. Part of the issue regarding security is it has to be ongoing in nature.”

Richer maintains that shippers aggregate a number of programs at once, including role-playing. This will enable the entire shipping staff to identify and react to a cyber attack.

“For example, when reporting an incident a trained person will look at the time, where they are, document who was involved and what happened,” she says. “At the same time, importers, exporters and service providers must work to diligently to see that their programs are current and continuous.”

There are many cargo security programs that have collectively reduced the risk of terrorism occurring in the supply chain: C-TPAT, AEO, PIP, J-AEO, C-AEO – the list of acronyms is extensive, observes Richer.

“All these programs have effectively addressed improving transparency in the supply chain and reducing the risk of attack,” she says, “But the new world of cyber attacks adds to the complexity of remaining secure.”

SC
MR

Latest Podcast
Talking Supply Chain: Doomsday never arrives for Baltimore bridge collapse impacts
The collapse of Baltimore’s Francis Scott Key bridge brought doomsday headlines for the supply chain. But the reality has been something less…
Listen in

About the Author

Patrick Burnson, Executive Editor
Patrick Burnson

Patrick is a widely-published writer and editor specializing in international trade, global logistics, and supply chain management. He is based in San Francisco, where he provides a Pacific Rim perspective on industry trends and forecasts. He may be reached at his downtown office: [email protected].

View Patrick 's author profile.

Subscribe

Supply Chain Management Review delivers the best industry content.
Subscribe today and get full access to all of Supply Chain Management Review’s exclusive content, email newsletters, premium resources and in-depth, comprehensive feature articles written by the industry's top experts on the subjects that matter most to supply chain professionals.
×

Search

Search

Sourcing & Procurement

Inventory Management Risk Management Global Trade Ports & Shipping

Business Management

Supply Chain TMS WMS 3PL Government & Regulation Sustainability Finance

Software & Technology

Artificial Intelligence Automation Cloud IoT Robotics Software

The Academy

Executive Education Associations Institutions Universities & Colleges

Resources

Podcasts Webcasts Companies Visionaries White Papers Special Reports Premiums Magazine Archive

Subscribe

SCMR Magazine Newsletters Magazine Archives Customer Service