Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Securing the Digital Supply Chain: An Essential Part of a Robust Security Strategy for Federal Agencies

by Jenna Sindle
October 1, 2019
in Cybersecurity
Reading Time: 4 mins read
A A
Securing the Digital Supply Chain: An Essential Part of a Robust Security Strategy for Federal Agencies
Share on FacebookShare on Twitter

Recently, there’s been an increased awareness of the security vulnerabilities that can impact government agencies through their network of suppliers, vendors and partners, more commonly known as the supply chain. When security discussions focus on the risks presented by insider threats, or attacks targeting the critical infrastructure of the government, the supply chain opens up a highly potent threat vector because it is so large and complex.

Download the Whitepaper

So how can government agencies mount an effective defense against this threat?

Jim McConnell, Corporate Security Management leader at Verizon, shared some highly effective strategies that his team has developed to combat threats to the supply chain. “As a complex and decentralized organization, we have a lot in common with federal agencies and our experience in securing our supply chain and working with our customers might prove valuable to our public sector counterparts,” he shared.

Though the idea of a strong supply chain risk management  (SCRM) program sounds intimidating, there are good practices to cover different elements of a digital supply chain. For example: SCRM scoping exercises, contract structures, technology security, shipping and receiving, installation, onsite verification & validation, and network monitoring are a few components of supply chain security that need to be accounted for. “By assessing the variety of SCRM elements, an organization can assess risk for each area and limit the threats and increasing overall security for an organization or agency,” said Jim.

Within an SCRM program there are a series of subfactors that agency security leaders need to consider. For example, the rubric of technology security and services covers the subsections, like financial review, influence of foreign ownership or citizenship, the validation of security compliance, managed services, subcontracting, outsourcing, and offshoring. Insight from each of these sub-categories provides a strong view into the security posture of where technology and services are coming from and enables a better understanding of the scope and opportunities within an organization’s digital supply chain. “Even if a product is manufactured by or services provided by an organization associated with a strategic ally of the United States, vulnerabilities and threats can still exist and still require a tiered level of ongoing security and compliance verification, before, during and after delivery,” said Jim.

The same deep dive to gather knowledge, define terms, and understand connections, should be  replicated across the other parts of the SCRM program. For example, an agency’s implementation of an integrity team conducting a post-installation verification and validation including by not limited to, penetration testing and traffic analysis to watch for any anomalous behavior. “Obviously if certain security and compliance anomalies are observed then the equipment or service needs to be mitigated within the timeframe related to the criticality, sensitivity, and mission purpose,” shared Jim.  “But, if all testing results are green, this new equipment or service can be passed to the regular security and compliance review cycle (i.e. pen testing) and as always security event monitoring of the technology or service traffic by a SOC monitoring team.”

With the recent leak of documents discussing the threats being waged by global actors against U.S. federal agencies, its supply chain, its contractors, and subcontractors to obtain national security secrets has made this often-overlooked area of security more important than ever. “It’s time that we had a clear understanding of the threat environment and appreciate how interconnected it is with the digital supply chain,” said Jim. “Once we have this more comprehensive picture of one’s supply chain, we can pool our skills and resources and work together. With this foundation in place we will be in a better position to mitigate the mission security battles and better protect mission-critical assets.”

Ready to download the whitepaper? Click here.

Tags: Chinese HackingCyber Supply ChaincybersecurityFederal Government Cyber SecurityOperation Safe CommerceRisk Scoresupply chainSupply Chain SecurityTransportation SecurityVerizon Threat Report

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5386 shares
    Share 2154 Tweet 1347
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us