PROC 5000 GRAD FA 2013 Procurement and Acquisition
Professor Claude Wiedower
Table of Contents
Abstract…………………………………………………………………………………………………………………………………..1
The Problem with Cyber-Security Collaboration………………………………………………………………………2
Cyber-Security Training in the Workplace………………………………………………………………………………..3
Abstract
The essence of global supply chains require that businesses large and small, exchange information of a precarious nature with numerous suppliers, several of which are vastly removed from the manufacturer. A company’s ability to protect sensitive information fluctuates based on the needs of the organization. Businesses and government have all adapted to the world of cyber connectivity, and are all garnering the benefits from social networking and ecommerce. The risks involved with maintaining good cyber-security continue to grow as senior managers and world leaders try to find better sources of dealing with internet predators. Large corporations have intricate supply chains with numerous external suppliers, which make it hard to address all of the risks associated with dealing with each one. With the continued growth of the internet and new information technology, internet scammers have made a concentrated effort to take advantage of any possible weaknesses within a company’s computer infrastructure. Maintaining and enforcing excellent cyber-security measures is at the top of the list for most businesses around the world.
The Problem with Cyber-Security Collaboration
Providing information to suppliers is imperative for businesses and government, even though by doing so they increase the risk for potential cyber invasion. According to Chief Executive Officer, Michael de Crespigny with the Information Security Forum, 40 percent of the data security breaches experienced by organizations arise from attacks on their suppliers (Robert J. Bowman, Supply ChainBrain, May 20, 2013). Many