Cybersecurity of Supply Chains

Location

Zoom (the link will be delivered to all registered participants).

Registration 

Registration is open until April 27.

Speakers

Professor Steven Melnyk, Michigan State University
Dr. Toni Männistö, Head of Research at CBRA, a Swiss institute of supply chain security and trade facilitation
Dr. Juha Hintsa, CEO and Founder, CBRA (www.cross-border.org) 
Professor Tero Vartiainen, University of Vaasa

Detailed Program

(the connections switched on 1445 for technical testing)

1500 Introduction, Professor Tero Vartiainen

  • The concept of cybersecurity
  • The concept of supply chain
  • Learning Diary, How to earn 1 credit from this seminar (doctoral students)

1515 Cybersecurity Across the Supply Chain (CSASC): A New View to a New Problem, Professor Steven Melnyk

Recent cybersecurity breaches have highlighted the resulting economic, political, and social effects.  These incidents highlight that cybersecurity is now a supply chain issue. This should not be surprising given the interconnected digital world that defines organizational ecosystems.  Due to their relative “newness”, coupled with the complexity of both supply chains and cybersecurity, there is lack of clarity and gaps in the current knowledge base regarding cybersecurity across the supply chain.  At the same time, this issue is of critical importance to both practitioners and researchers, and thus needs to be structured in such a way to facilitate a common understanding of what cybersecurity across the supply chain cybersecurity entails and the subsequent research opportunities.

In this presentation, we will cover the following topics:

  • What is CSASC? Why is it important? Why now?
  • Can we successfully mandate compliance in today’s world?
  • What are the key challenges to success with CSASC (with specific attention to small to medium-sized suppliers, cybersecurity readiness, and supplier willingness)?
  • What are some of the major, unresolved research challenges?
  • How can we most effectively study this topic?
  • To what extent are the resulting findings and insights unique to cybersecurity (i.e., can they be generalized)?

1700 Break, 30 min

1730 The Nexus between Cyber Crime and Global Supply Chains — from Theory to Practise , Dr. Toni Männistö, Dr. Juha Hintsa

Modern supply chains are increasingly vulnerable to cyber threats due to their high reliance on computer systems and electronic databases. In fact, the same ICT technologies, that have made international logistics more efficient, have exposed supply chain operations to new threats such as viruses, hacking, social engineering, cyber sabotage, and ransomware. Numerous past incidents highlight the criticality of cyber security for the functioning of global value chains:

  • NotPetya malware made applications and data unavailable, and several systems had to be shut down as a precautionary measure in 2017. The disruption concerned the Maersk container business, especially Maersk Line, APM terminals and Damco.
  • TNT Express was significantly affected by a ransomware that crippled the company’s computer systems in 2017. While TNT Express operations and communications systems were been disrupted, no data breach is known to have occurred.
  • In the Port of Antwerp, a drug trafficking organisation used phishing attacks to trick port employees to install malwares onto their work computers. This tactic allowed the criminals to locate and steal those containers inside the port where their associates had hidden drugs at the country of departure. After the port operator installed a firewall and got rid of the malware, the criminals broke into port offices and installed key loggers on the computers.
  • In March 2022, Toyota was hit by a cyber-attack that shut down the car maker’s factories for one day. The incident cut down production output by 13,000 vehicles.

 

This seminar presentation discusses key theories and best practices that should underpin advanced supply chain cyber strategies. The presentation will cover the following themes:

  • The nexus between supply chains and cyber crime
  • Examples of cyber crime incidents in global supply chains 
  • Crime displacement and supply chain cyber security
  • Key elements of a supply chain cyber security strategy

latest 1915 Closure, Professor Tero Vartiainen

Credit points

Doctoral students participating in the seminar can obtain 1 credit point. This requires participating and completing the assignment. Instructions for the assignment will be given at the seminar.

Registration fee

This seminar is free-of-charge for Inforte.fi member organization's staff and their PhD students. For others the participation fee is 250 €.