Cybersecurity in Supply Chain: Fundamentals and Best Practices

10 hours (1 credit)

Prof. Ruchita Gupta and Prof. Amit Kumar Das

Mr. Arnab Banerjee, Director, Supply Chain AI, Smart Manufacturing & AI at Micron Technology.

Digital technologies have changed the way supply chain operations are structured. The adoption of emerging digital technologies and their integration with supply chain not only provides benefit to organizations towards resource saving but also pose challenges of increased cyber-attacks in the logistics and supply chain environment making firms to lose the competitive position in the market Cyber supply chain risks include sourcing, vendor management, supply chain continuity and quality, transportation security and many other functions across the enterprise and require a coordinated effort to address. The elimination or reduction of cyber risk and vulnerability can be achieved by enhancing cybersecurity in an organisation. This course aims to focus on identification, assessment, evaluation, monitoring and mitigating the cyber risks with best practices implementation to have secured supply chain.

Learning Objectives:

  • To understand the role of cybersecurity in the supply chain.
  • To identify vulnerabilities and risks unique to supply chains
  • To explore frameworks, standards, and best practices for securing supply chains.
  • To develop practical skills to assess and mitigate cybersecurity risks in supply chains.

Learning Outcomes

  • Understand the importance of cybersecurity in supply chains and identify common threats and vulnerabilities.
  • Apply frameworks and best practices to assess and mitigate cybersecurity risks in supply chain networks.
  • Utilize emerging technologies like blockchain and AI to enhance supply chain security.
  • Design incident response and recovery plans to minimize the impact of cyberattacks.

The Course will utilize a blend of teaching methodologies to ensure an engaging and effective learning experience. In addition to lecture sessions, the course will engage the participants through the following learning methods

  • Case Studies: Real-world examples to illustrate the application of concepts.
  • Videos: Real-life video snippets for a clear understanding of the concept
  • Exercises: Practical exercises to apply the learned concepts.
Cyber Security And Supply Chain Management: Risks, Challenges, And Solutions (Trends, Challenges And Solutions In Contemporary Supply Chain Management by Steven Carnovale, Sengun Yeniyurt
Module (Duration) Session No. Topics Readings
Module 1 (2 hrs) 1-2 Introduction to modern supply chain
  • Introduction to structure and design of modern digital supply chain
  • Challenges of Digital supply chain and Key supply chain vulnerabilities
  • Hammi B, Zeadally S, Nebhen J. Security threats, countermeasures, and challenges of digital supply chains. ACM Computing Surveys. 2023 Jul 17;55(14s):1-40.
  • Onyia U, Ani IS, Nwankwo UF. Addressing the challenges towards the adoption of digital technologies in construction supply chain management. Discover Civil Engineering. 2024 Nov 15;1(1):118.
Module 2 (2 hrs) 3-4 Introduction to Cyber risk
  • Types of Cyber Threats
  • Impact of various cyber threats on supply chain performance
  • Admass WS, Munaye YY, Diro AA. Cyber security: State of the art, challenges and future directions. Cyber Security and Applications. 2024 Jan 1;2:100031.
  • Kumar S, Mallipeddi RR. Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions. Production and Operations Management. 2022 Dec;31(12):4488-500.
Module 3 (2 hrs) 5-6 Risk Identification and Assessment
  • Cyber threat intelligence gathering
  • Cyber risk assessment frameworks
  • Ekstedt M, Afzal Z, Mukherjee P, Hacks S, Lagerström R. Yet another cybersecurity risk assessment framework. International Journal of Information Security. 2023 Dec;22(6):1713-29.
  • Tarakçı E, Gönül AM. Risk Analysis and Assessment Framework for Cyber Security in Management Systems. OHS ACADEMY. 2023;6(3):165-72.
Module 4 (2 hrs) 7-8 Risk Mitigation and Best Practices
  • Recovery strategies and resilience-building.
  • Cybersecurity technologies (firewalls, IDS/IPS, encryption).
  • Roopesh M. Cybersecurity solutions and practices: firewalls, intrusion detection/prevention, encryption, multi-factor authentication. Academic Journal on Business Administration, Innovation & Sustainability. 2024 Jul 25;4(3):37-52.
  • Aslan Ö, Aktuğ SS, Ozkan-Okay M, Yilmaz AA, Akin E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics. 2023 Mar 11;12(6):1333.
Module 5 (2 hrs) 9-10 Application of emerging technologies for Cybersecurity
  • Introduction to Blockchain and emerging technologies
  • Security associated with Blockchain technology
  • Krichen M. Strengthening the security of smart contracts through the power of artificial intelligence. Computers. 2023 May 18;12(5):107.
  • Maleh Y, Shojafar M, Alazab M, Romdhani I, editors. Blockchain for cybersecurity and privacy: architectures, challenges, and applications.