You've requested...

Download this next:

Enterprise Labeling a Supply Chain Strategic Imperative

Doing business in today's global supply chain has become a complex challenge. Labeling influences a variety of strategic business drivers including regulatory compliance, customer responsiveness, business continuity, and supply chain efficiency. Consequently, it is essential that labeling strategies evolve alongside supply chain strategies for companies to be successful.

Access this in-depth white paper to discover how to implement integrated, data-driven labeling in your supply chain management strategy.

These are also closely related to: "Linking the Global Supply Chain"

  • Five stages of supply chain management

    Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer. Because it's such an expansive, complex undertaking, each partner -- from suppliers to manufacturers and beyond -- must communicate and work together to create efficiencies, manage risk and adapt quickly to change. In this infographic we take a look at the 5 steps of supply chain management.

  • A Computer Weekly buyer's guide to supply chain resilience

    The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer’s guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.

Find more content like what you just read:

  • Beyond GPO: Evolving Supply Chain from Transactional to Strategic

    Read this paper to garner the value of a transformational—not transactional—healthcare supply chain approach, 4 ways to achieve long-term supplier value, and top supply chain trends.

    Download

  • CW APAC – July 2021: Trend Watch: Supply Chain Security

    In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain

    Download

  • Key lessons learned from SolarWinds

    Explore some of the key lessons we've learned from SolarWinds, and tips for applying them to your supply chain, in our expert guide—which you can download after a brief survey.

    Download

  • A Computer Weekly buyer's guide to post-Covid-19 supply chain management

    The supply chain has been under great pressure during the Covid-19 pandemic, not helped by several high-profile cyber attacks. In this 15-page buyer's guide, Computer Weekly looks at the key considerations for business leaders going forward, the importance of data transparency and how cyber attacks on the supply chain have increased.

    Download

  • The CISO's guide to supply chain security

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

    Download

  • A Computer Weekly buyer's guide to supply chain security

    Organisations are increasingly taking the initiative when it comes to firming up their supply chain security. In this 15-page buyer's guide, Computer Weekly looks at data's role in enabling faster response times, the challenges firms face in increasing their cyber resilience and how the role of the IT security leader has evolved.

    Download

  • Supply chain management balance shifts from efficiency to resilience under Covid

    This e-guide explores these matters, beginning with a comprehensive article that ranges over supply chain management, from a macro level through how trading platforms have been flexed to switch suppliers rapidly down to how robots have been quickly deployed to solve problems of scale.

    Download

  • New privacy laws are coming, first stop California

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

    Download

  • Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains

    In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.

    Download

  • MicroScope – September 2022: The green agenda

    Sustainability is now seen as a necessity for business to have on their agenda, so read about how the channel is turning green to capture customer attention. Also discover how the pandemic has changed sales forever and boosted the importance of relationships, as well as learn about how to handle currency fluctuations, rises and inflation.

    Download

  • Securing your software supply chain

    Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.

    Download

  • Computer Weekly – 29 September 2020: How supply chain management is changing after Covid-19

    In this week's Computer Weekly, we examine the profound changes in supply chain management as a result of the global pandemic. We find out how digital experience platforms can help deliver an omni-channel web presence. And we look at the role of technology in cracking down on international money laundering. Read the issue now.

    Download

  • Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise

    In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.

    Download

  • Computer Weekly – 13 September 2022: Source responsibly: Tech sector efforts to root out forced labour are failing

    In this week's Computer Weekly, we analyse the technology industry's failure to extirpate forced labour and slavery from its supply chains. We find out how cyber security firm Okta is rebuilding customer trust after a major security incident. And we discover how Caterpillar is modernising its data management. Read the issue now.

    Download

  • The Daisy Chain of Risk – Examining the Links in Your Vendor Ecosystem

    All of our organizations are dependent on their supply chain and having a secure and uninterrupted ecosystem of vendors and partners is critical to smooth operations. Of course, if it is important to us, then it is a target, no matter the locale. The recent SolarWinds attack illustrated how a patient adversary can be successful as they work their way through multiple vendors in a supply chain to reach their desired target. This infiltration was difficult to spot and for many, even harder to respond to adequately. These types of attacks will continue and grow in sophistication. Organizations need to use OSINT and other vendor tools that can investigate their partners in the supply chain to gain insight into if they can trust what those applications are doing on their network. Join DomainTools Senior Security Researcher, Chad Anderson, and (ISC)2 on March 4, 2021 at 1:00 PM Eastern for a roundtable discussion on supply chain attacks and security, what tools work and can provide insight into your supply chain and partner’s infrastructure, and how a good security posture builds from knowing the inventory and behaviors of what’s running on your supply chain.

    Download

  • Best practices to maximize supply chain sustainability

    For today’s supply chains, sustainability means everything, and it’s critical that organizations continuously monitor their operations to ensure they can efficiently respond to risks and improve performance. However, keeping an eye on these processes is no easy task. Browse this white paper to learn more.

    Download

  • 3 proposals for creating a more sustainable supply chain

    In this white paper, discover key insights from 3 successful supply chain transformations, and 3 essential proposals for next-generation sustainable supply chains.

    Download

  • Zero Trust for Supply Chain Collaboration

    Zero Trust security can help secure supply chain collaboration and data exchange, even with untrusted partners. Learn how Zentera's software-defined solution enables fine-grained access controls and protects against data leaks. Read the full solution brief to discover more.

    Download

  • Securing Cyber-Attack Vulnerabilities From Your Supply Chain

    Your weakest cybersecurity link may not be your own. Taking internal precautions in email security is essential to protecting your organization from data breaches, but vulnerabilities can also come from outside partners. Many organizations rely on supply chains, vendors, partners, and others to conduct business. For example, financial institutions may utilize vendors for software (internal software as well mobile/online banking), real estate appraisers, law firms, audit firms; the list is long. Unfortunately, these third-parties not only provide vital services but also create more risk. Organizations need to consider supply chain risks as part of their cybersecurity policy. This webinar will investigate: • Supply chains and the digital risks they pose • How organizations can identify supply chain vulnerabilities • How to mitigate risks while allowing legitimate communication to continue.

    Download

  • Supply Chain Risk

    The global supply chain is vulnerable to cyberattacks due to its diverse and multifaceted aspects. Cybersecurity supply chain risk management guidance is essential for businesses to protect themselves, their partners, and their consumers. They must assess cybersecurity risks at all levels of their organization and consider the vulnerabilities of all players involved in creating a product or service, particularly in light of increasing incidences of cyberattacks carried on on supply chains. Threat Actors have shifted their tactics to compromise firms via their supply chains in an attempt to identify and exploit the weakest links, requiring organizations to reevaluate their cybersecurity approach accordingly.

    Download

  • Securing Supply Chains Through Intelligence Sharing

    We know that security is only as strong as its weakest link, and for many businesses that weak link is their supply chain – partners that provide essential services but manage their own security with little visibility for your organization. Many intelligence sharing communities have emerged including ISACs and ISAOs, that enable members to share up-to-date intelligence with peers and automate actions to stop new threats. It seems obvious that this model should be extended to the supply chain, but there are organizational and technical challenges that need to be addressed. Join security collaboration experts from Cyware for an interactive discussion of how to overcome these challenges and successfully extend intelligence sharing and collective defense to your supply chain partners.

    Download

  • How to Detect & Stop Email Fraud in Your Supply Chain​

    Most companies depend on a variety of external vendors and partners to support their business. These interdependent relationships form a multi-faceted third-party ecosystem called the supply chain. Because of its complexity, the supply chain is an attractive target for cybercriminals. Where a scam targets the supply chain, the organisation will suffer substantial losses, both in time and money, in particular the subsequent costs to resolve the problem and repair the damage. Supply chain fraud attacks leverage both impersonation through Business Email Compromise (BEC) and Email Account Compromise (EAC). Has your organisation assessed the cybersecurity risks from your supply chain? How can you better protect your company? In this 30-mns insightful session, you will learn: - Real-world supply chain fraud examples - Grading risk in your suppliers - How to detect threats, including payroll diversion and supplier invoicing fraud - How to stop these multi-million-dollar email fraud attack

    Download

  • How to Detect & Stop Email Fraud in Your Supply Chain​

    Most companies depend on a variety of external vendors and partners to support their business. These interdependent relationships form a multi-faceted third-party ecosystem called the supply chain. Because of its complexity, the supply chain is an attractive target for cybercriminals. Where a scam targets the supply chain, the organisation will suffer substantial losses, both in time and money, in particular the subsequent costs to resolve the problem and repair the damage. Supply chain fraud attacks leverage both impersonation through Business Email Compromise (BEC) and Email Account Compromise (EAC). Has your organisation assessed the cybersecurity risks from your supply chain? How can you better protect your company? In this 30-mns insightful session, you will learn: - Real-world supply chain fraud examples - Grading risk in your suppliers - How to detect threats, including payroll diversion and supplier invoicing fraud - How to stop these multi-million-dollar email fraud attack

    Download

  • Protecting your software supply chain with Palo Alto & Google Cloud

    As software supply chain attacks continue to rise, your organization must adapt and evolve to protect your digital assets. This webinar from Palo Alto & Google Cloud will delve into: • The complexities of software supply chain attacks • How these attacks will impact your business • The steps required to safeguard against these threats Tune into the discussion to learn from industry leaders as they share insights on the latest attack vectors, and the importance of collaboration between vendors and partners to ensure a secure software supply chain.

    Download

  • Defining the Modern Supply Chain: Leveraging Data and Technology for Success

    Supply chains have vastly changed over the last 18 months as logistic hurdles and stifled fulfillments have left consumers scrutinizing their business partners. As organizations seek to improve customer experience, many have started to execute digital transformation initiatives by implementing technologies to modernize their supply chain. For organizations looking to reduce costs and improve communication with customers, leveraging data is key. However, as these organizations drive data strategies and digital transformation initiatives, what barriers to success will they face, and what initiatives should they take to meet consumer demands? Tune in to Defining the Modern Supply Chain: Leveraging Data and Technology for Success as we explore the state of today’s supply chain and take a deeper look into the tools and technologies organizations are incorporating into their digital supply chain modernization strategies. We’ll discuss: ● How to get started on modernizing your organization’s supply chain ● Supply chain challenges organizations face today from the distributed nature of data to difficulties accessing and sharing that data ● Why organizations are looking to leverage data insights, inside and outside the warehouse ● Tools and solutions to improving supply chain efficiency and resiliency ● Additional topics of interest

    Download

  • Improve Security Resilience Against Supply Chain Threats

    On March 1st, the world's largest carmaker halted production at all of its plants in Japan after a cyber-attack on a key supplier. The incident setback production of vehicles by about 13,000 units. After the SolarWinds exploit and Kaseya ransomware attack, security risks inside the supply chain are once again the focus. Supply chain related attacks are sophisticated: software, partner, and outsourced employees are all vulnerable. These non-system "vulnerabilities" are becoming one of the most significant threats to the organization's security resilience. Join us for this webinar and gain insight about: 1. Why supply chain threats are critical. 2. How to build effective mitigation against supply chain threats to maintain security resilience

    Download

  • Australia's cybersecurity game plan

    In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.

    Download

  • Your key for securing the software supply chain

    In recent years, the software supply chain has experienced the worst and most consequential cyber attacks out of any other sector. In fact, 98% of organizations have felt the impact of a breach in their supply chain. So, what steps can you take to better protect your software supply chain? Tune into this webinar to learn more.

    Download

  • CW ANZ, July 2020: Expert Advice on Security

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

    Download

  • Streamline Supply Chain Operations with Business Intelligence

    "Ongoing supply chain and logistic disruptions plagued 2021, with Statistica’s ‘Share of supply chain disruptions worldwide by region 2021’ reporting 11,642 disruptions worldwide. Whilst supply chains tentatively recover in 2022, organizations are still affected by delayed deliveries and struggle to meet demands amidst ongoing and uncertain economic and worldwide factors. To accommodate ongoing supply chain challenges , organizations are turning to business intelligence solutions to streamline this complex set of business operations. With the rise of business intelligence and artificial intelligence, companies are leveraging both industry and proprietary data to understand the best way to partner within the supplier network, optimize routes and manage stock to proactively meet consumer demands. By utilizing business intelligence to manage their supply chain, organizations will be able to quickly anticipate and respond to future disruptions. In Streamline Supply Chain Operations with Business Intelligence, host Gowri Selka and guests will share how BI Tools can play a key role in streamlining your organizations’ transportation and logistics operations by anticipating potential disruptions and drafting surefire solutions. Join us to learn: - Establishing key supply chain performance indicators to drive synergies within the supply chain ecosystem - How demand forecasting and stock management can improve overall business outcomes - How understanding customer data can generate useful insights on operational & risk management

    Download

  • Streamline Supply Chain Operations with Business Intelligence

    "Ongoing supply chain and logistic disruptions plagued 2021, with Statistica’s ‘Share of supply chain disruptions worldwide by region 2021’ reporting 11,642 disruptions worldwide. Whilst supply chains tentatively recover in 2022, organizations are still affected by delayed deliveries and struggle to meet demands amidst ongoing and uncertain economic and worldwide factors. To accommodate ongoing supply chain challenges , organizations are turning to business intelligence solutions to streamline this complex set of business operations. With the rise of business intelligence and artificial intelligence, companies are leveraging both industry and proprietary data to understand the best way to partner within the supplier network, optimize routes and manage stock to proactively meet consumer demands. By utilizing business intelligence to manage their supply chain, organizations will be able to quickly anticipate and respond to future disruptions. In Streamline Supply Chain Operations with Business Intelligence, host Gowri Selka and guests will share how BI Tools can play a key role in streamlining your organizations’ transportation and logistics operations by anticipating potential disruptions and drafting surefire solutions. Join us to learn: - Establishing key supply chain performance indicators to drive synergies within the supply chain ecosystem - How demand forecasting and stock management can improve overall business outcomes - How understanding customer data can generate useful insights on operational & risk management

    Download

  • Third-Party Vulnerabilities: Demystifying the Unknown

    What parts of your cyber supply chain are you unknowingly neglecting? The SolarWinds hack was a wake-up call for companies to check their suppliers and partners for risk. There are still plenty of other dangers lurking in third party systems ranging from software applications and APIs through to embedded devices, chipsets, firmware, and IoT solutions. These risks lie in other organizations' assets and are seemingly out of your control, but there are protective measures that you can take. Attending this webinar will give you a new perspective on this complex challenge and some actionable insights on where to begin. Talking points will include: - The kinds of vulnerabilities that exist in third-party resources - How to audit for supply chain vulnerabilities - Strategies for mitigating supply chain availabilities early

    Download

  • Strengthening Your Supply Chain: Best Practices in Third-Party Risk Management

    In today’s interconnected world, supply chains are increasingly exposed to cyber threats. A single weak link in the supply chain can have far reaching consequences, impacting not only your organization but also your partners and stakeholders. By understanding and mitigating cyber security vulnerabilities within the supply chain, you can protect your sensitive data, maintain business continuity, safeguard your reputation, and ensure compliance with regulations. Join us at this Live Webinar to learn: - Importance of Third-Party Risk Management - Best Practices for Assessing and Mitigating Risks- - Compliance and Regulatory Frameworks Register To Attend Now For enquiry, please contact us at marketing-apac@securityscorecard.io

    Download

  • How a resilient health care supply chain affects patient care

    Supply chain excellence impacts health care quality and experience for patients, therefore, a resilient supply chain is crucial for delivering that care and keeping an eye on your bottom line. This infographic details five steps your organization should take to bolster more efficient health care supply chain management.

    Download

  • Optimizing Supply Chain Performance with the Power of Data

    Discover in this e-book the secrets to optimizing supply chain performance with unified data, with insights from 450 senior supply chain decision makers.

    Download

  • Improve Business Outcomes with Decision Intelligence

    By leveraging the Supply Chain Orchestrator, supply chain businesses can recognize, understand, optimize, and leverage data more efficiently to create an agile and resilient supply chain model. Read on to learn how you can utilize the tool to improve productivity and drive value for your business.

    Download

  • Supply Chain Orchestrator enhances retailer repackaging plans

    Many companies do not have the necessary flexibility to operate in a supply constrained environment. This is where InterSystems’ Supply Chain Orchestrator comes in, automating and optimizing your repackaging production plan based on true forecast and supply to maximize fill rate. Discover the top 4 benefits here.

    Download

  • Physician leaders’ guide to increasing patient value & care

    A physician supply chain leader acts as a medical director, and these roles must have business savvy, as well as embrace teamwork. Read this paper as Dr. Chung, CMO of Advantus, lends his insight into forming physician resource optimization teams, holding cross-disciplinary trainings, and 3 initiatives that increase value for patients.

    Download

  • Today’s new supply chains: moving from insight to action in real time

    The journey of the products in your supply chain are often full of surprises, despite your best-laid plans. Access this solution overview to learn how you can monitor every aspect of your value chain down to the item level & develop the agility to overcome obstacles, boosting customer satisfaction & revenue with the Parkour supply

    Download

  • Streamline supply chain operations with a data platform

    While many recognize the importance of seamless supply chain operations for business success, siloed data makes it difficult to achieve. This product overview examines a data platform designed to complement your existing architecture to enable intelligent supply chain orchestration. Read on to learn how your business can wield it.

    Download

  • Securing CI/CD Pipelines

    Join WiCyS's strategic partner Lara Goldstein from Microsoft to learn best practices for securing CI/CD pipelines to prevent software supply-chain attacks.

    Download

  • Digital Supply Chain: The Exposed Flank

    This talk will speak to the issues pertaining to supply chain security as is relates to global organizations and the highly interconnected nature of suppliers and corporations. The presenter will pull from personal war stories to help illustrate the need to not just worry about the main corporate security perimeter, but to address the extended perimeter and the exposures and risks that arise from the supply chain. Such aspects of an exposed supply chain include trading partner networks, code developed by offshore development centers, and outsourced help desks. Presenter: Dave Lewis, Global Advisory CISO, Duo Security, now part of Cisco Moderator: Catherine Chapman, Independent Cybersecurity Journalist

    Download

  • Using Intelligence To Safeguard Your Supply Chain Against Cyber Risks

    Security teams are undergoing pressure to monitor and respond to indirect threats to their organisation. New thinking about safeguarding your supply chain has expanded beyond just stolen certificates and code injections targeting your software vendors. Phishing, ransomware, and spyware attacks against any of your partners can also disrupt business continuity or disclose sensitive data that affects you. Join Silobreaker and (ISC)² on 13 September 2022 at 1:00 pm BST to learn about some of the most recent supply chain incidents and best practices to build an effective intelligence programme, helping you navigate the threats beyond your control. In this webinar, you will learn: • The impact of recent supply chain incidents • How to monitor compromised vendors across your supply chain • How to identify when specific threats and risks are trending up so you can be ready to respond • Best practices to build an effective intelligence programme that addresses your risks, without overloading your analysts

    Download

  • Designing The Right supply Chain For The Growing Demand For Vaccines...

    Full title: Designing The Right supply Chain For The Growing Demand For Vaccines For Immunisation Designing the right Supply Chain Strategy for Vaccine/Biopharma growth: Global Supply Chain have witnessed unprecedented disruption in the last 2-3 years. I intend to cover what happened and why this impact was truly unique to supply chain across industries and particularly in pharma. New challenges we see in biopharma/ vaccine supply chain going forward and what we are doing to mitigate risk and build resilience into global supply chain to ensure continuity of supply. I would also be covering innovation in supply chain and cold chain logistics space which will drive development and growth in a sustainable manner for the industry going forward. I will share few of my learnings which in my mind will be key factors in building supply chain’s of the future.

    Download

  • Missing Link Supply Chain Dive Ebook

    The pandemic exposed vulnerabilities in supply chains worldwide. Companies rushed to invest in new technologies, but many are still facing the same issues. Download the e-book, “The Missing Link in Supply Chains: Analytics Automation,” to reveal how automation can transform your supply chain operations.

    Download

  • How Supply Chain Attacks Work - And What You Can Do to Stop Them

    Supply chain attacks made headlines in 2022, sending shockwaves through the industry as security and business leaders scrambled to reexamine the security of their own supply chains. In this webinar, experts talk through the stages of a supply chain attack and the different types of attacks to look for. You will also learn what tools and strategies you can start using immediately to assess your own supply chain security and put defenses in place to keep your supply chain protected. During this webinar you will: Learn about where hidden supply chain vulnerabilities might be lurking in your systems. Get tactics for how to assess your current supply chain security. Find out how SBOMs can be most effectively used to shore up the software supply chain. Presented by featured speakers Jason Clark & Jeffrey Martin. Moderated by Becky Bracken.

    Download

  • Unlock Actionable Insights with the IRIS Data Platform

    The ability to leverage data from your dynamic supply chain to make prescriptive decisions that impact the organization has never been more critical. Read on to learn how you can utilize a data platform to drive actionable insights into supply chain information and eliminate data silos, thereby accelerating time to value across your ecosystem.

    Download