Learning Supply Chain Cybersecurity
Offered By: LinkedIn Learning
Course Description
Overview
Learn how cybersecurity best practices, policies, and processes can made your supply chain more secure.
Business supply chains are becoming more complex and reliant on technology. This opens them to unique cyber risksâand increased regulatory requirements. Explore the challenges, considerations, and potential conflicts of interest businesses face as they begin to address cybersecurity in the supply chain. Dr. Emma Osborn discusses how supply chains are evolving, and the different ways that businesses within the supply chain interact. She reviews examples of real-world supply chains and uses these to explore how the scope of cybersecurity risk is creeping past traditional organizational boundaries. You can then learn some approaches for managing relationships and improving supply chain security, discovering what works best for each scenario.
Business supply chains are becoming more complex and reliant on technology. This opens them to unique cyber risksâand increased regulatory requirements. Explore the challenges, considerations, and potential conflicts of interest businesses face as they begin to address cybersecurity in the supply chain. Dr. Emma Osborn discusses how supply chains are evolving, and the different ways that businesses within the supply chain interact. She reviews examples of real-world supply chains and uses these to explore how the scope of cybersecurity risk is creeping past traditional organizational boundaries. You can then learn some approaches for managing relationships and improving supply chain security, discovering what works best for each scenario.
Syllabus
Introduction
- The importance of supply chain cybersecurity
- What you should know before watching this course
- Swapping security for ease of use
- Scope creep: Comparing organizational and supply chain cybersecurity
- Cyberthreats in the supply chain
- Comparing common cybersecurity practices to supply chain security issues
- Example 1: Large organization, thousands of suppliers of different sizes
- Example 2: Small or medium-sized business, a number of large customers
- Example 3: Ecosystem of SMEs/SMBs
- When working in a supply chain, who owns what?
- Why might a supplier’s risk assessment differ from their customer’s?
- Policies and compliance
- Adapting responsibilities
- Prioritizing transparency and communication
- Making security easier
- Combatting complexity
- Changing perceptions
- Next steps
Taught by
Emma Osborn
Related Courses
International TradeMarginal Revolution University Supply Chain Management: A Learning Perspective
Korea Advanced Institute of Science and Technology via Coursera Supply Chain Fundamentals
Massachusetts Institute of Technology via edX Tackling Global Food Safety
Queen's University Belfast via FutureLearn Operations Management
University of Illinois at Urbana-Champaign via Coursera