Protecting the Cyber Supply Chain

By Jon Oltsik

Jon Oltsik is the Senior Principal Analyst, Enterprise Strategy Group.  The ESG Research Report, Cyber Supply Chain Security Revisitedexamines cyber supply chain security in the U.S. critical infrastructure.

Critical infrastructure organizations have large and complex IT networks built on top of an assortment of heterogeneous technologies.  Many large enterprises also extend their in-house IT assets to an external web of connected business partners, customers, outsourcers, and suppliers.  This multifaceted amalgamation of participants is sometimes known as the cyber supply chain which ESG (Enterprise Strategy Group) defines as: “The entire set of key actors involved with or using cyber infrastructure: system end-users, policy makers, acquisition specialists, business partners, system integrators, network providers, and software/hardware suppliers, etc.”

Cybersecurity principles and best practices are typically applied to internal applications, networks, and systems as large organizations seek to mitigate risk and detect/respond to cyber-attacks.  Many enterprises are actually bolstering their internal defenses – ESG research indicates that 57 percent of organizations increased their cybersecurity spending in 2015. 

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+


Related Articles

Search

Close