10 hours (1 credit)
Prof. Ruchita Gupta and Prof. Amit Kumar Das
Digital technologies have changed the way supply chain operations are structured. The adoption of emerging digital technologies and their integration with supply chain not only provides benefit to organizations towards resource saving but also pose challenges of increased cyber-attacks in the logistics and supply chain environment making firms to lose the competitive position in the market Cyber supply chain risks include sourcing, vendor management, supply chain continuity and quality, transportation security and many other functions across the enterprise and require a coordinated effort to address. The elimination or reduction of cyber risk and vulnerability can be achieved by enhancing cybersecurity in an organisation. This course aims to focus on identification, assessment, evaluation, monitoring and mitigating the cyber risks with best practices implementation to have secured supply chain.
Learning Objectives:
- To understand the role of cybersecurity in the supply chain.
- To identify vulnerabilities and risks unique to supply chains
- To explore frameworks, standards, and best practices for securing supply chains.
- To develop practical skills to assess and mitigate cybersecurity risks in supply chains.
Learning Outcomes
- Understand the importance of cybersecurity in supply chains and identify common threats and vulnerabilities.
- Apply frameworks and best practices to assess and mitigate cybersecurity risks in supply chain networks.
- Utilize emerging technologies like blockchain and AI to enhance supply chain security.
- Design incident response and recovery plans to minimize the impact of cyberattacks.
The Course will utilize a blend of teaching methodologies to ensure an engaging and effective learning experience. In addition to lecture sessions, the course will engage the participants through the following learning methods
- Case Studies: Real-world examples to illustrate the application of concepts.
- Videos: Real-life video snippets for a clear understanding of the concept
- Exercises: Practical exercises to apply the learned concepts.
Module (Duration) | Session No. | Topics | Readings |
---|---|---|---|
Module 1 (2 hrs) | 1-2 | Introduction to modern supply chain
|
|
Module 2 (2 hrs) | 3-4 | Introduction to Cyber risk
|
|
Module 3 (2 hrs) | 5-6 | Risk Identification and Assessment
|
|
Module 4 (2 hrs) | 7-8 | Risk Mitigation and Best Practices
|
|
Module 5 (2 hrs) | 9-10 | Application of emerging technologies for Cybersecurity
|
|