SlideShare a Scribd company logo
SESSION ID:
#RSAC
Integrating Cybersecurity Into
Supply Chain Risk Management
GRC-W03 Jon Boyens
Program Manager, Cyber SCRM
National Institute for Standards
and Technology
#RSAC
What does Cybersecurity Have to Do
with Supply Chains Anyway?
#RSAC
ICT and Non-ICT External Dependencies
ENTITY
Up
Stream
Non-
ICT
Partne
rs
Down
Stream
Non-
ICT
Partne
rs
ICT Supply Chain
(ICT Products & Services)
Non-ICT Products & Service
Non-ICT Products & Service
ICT Supply Chain (ICT Products &
Services)
TRUST
-Organization
-Process
-Products/Service
But Verify
-Due Diligence
-Standards/Audits
-Testing
3
#RSAC
Anatomy of Cyber Supply Chain Risk
Inbound Supply Chain:
Risks from Suppliers
Unwanted Functionality
Info/Network Breaches
Supplier Insider Threats
Manufacturing/
SC Risks
Theft/alteration of data
Compromise of SC business SW
Compromise of control
systems, test or other
equipment.
Disruptions in vetted suppliers
Outbound Supply
Chain
Theft/Tampering
Counterfeits
Product Design
Design Flaws
4
#RSAC
How Did We Get Here?
Cyber
• Growing sophistication of ICT
• Number and scale of information systems
• Increasing reliance on COTS
Supply
Chain
• Speed and scale of globalization
• Complex supply chain (logically long and geographically diverse)
Risk
• Significant increase in the number of entities who ‘touch’ products and services
• Natural disasters, poor product/service quality and poor security practices
Manag
ement
• Lack of visibility and understanding: how technology is developed, integrated and
deployed and practices to assure security.
• A lack of control of the decisions impacting the inherited risks and ability to
effectively mitigate those risks.
5
#RSAC
No End in Sight for Supply Chain Cyber Risks
Three trends are exacerbating cyber risks to supply chains:
 Internet of Things: everything is smart and interconnected
 IT-enabled Supply Chain Management: product and supply
chain data run on top of business software that connects supply
chains – and weak links abound globally
 3-D Printing: production is going viral and digital.
6
#RSAC
Cyber Supply Chain Risks Emerge At Every Stage
What Can Happen?
Delivery of poor quality, compromised or counterfeit products
that diminish brand reputation
Loss of intellectual property shared with supply chain partners
Access to company IT networks, customer information or
operational control systems through supplier access
Impact on revenues, brand reputation and shareholder value
7
#RSAC
What Does Supply Chain Have to Do with
Cyber Risks?
80% of all info breaches originate in the supply chain
45% of all cyber breaches were attributed to past partners
72% of companies do NOT have full visibility into their
supply chains
59% of companies do NOT have a process for assessing
cybersecurity of third party providers with which
they share data or networks
40% of attack campaigns targeted manufacturing and
service sectors (20% each).
8
#RSAC
Supply Chain Disruptions are Costly!
98% of manufacturers will experience a supply chain
disruption in the next 2 years (80% for all firms)
55% of disruptions cost over $25 million
53% of disruptions caused from unplanned IT/Comms outage
24% of disruptions caused from cyber attacks
22% of disruptions caused from data breaches
Need More?
9
#RSAC
What’s the Risk? For Example….
Supplier-provided keyboard software gave hackers access to
owner data on 600 million Samsung Galaxy phones
Supplier-provided advertising SW tampered with computer
security so that attackers could snoop on browser traffic on
Lenovo computers.
Poor information security by service suppliers led to data
breaches at Target, Home Depot, Goodwill….and many others.
10
#RSAC
Match the Supplier with the Compromised
Customer
Suppliers Customers
Maroochy
Cisco
Fiat/Jeep
T-Mobile
Data breach of Tech Certification firm exposed personnel
data on employees of client company
Hack of credit check database exposed new customer
PPI.
Supplier entertainment system enabled remote take-
over of controls in a car.
Uncancelled credentials of former contractor enabled
unauthorized sewage release from water treatment
plant.
11
#RSAC
Ask Yourself the Following
Can you identify the sub-tier suppliers for critical IT
components or software embedded in your products and
systems?
Is cyber risk part of vendor selection, management and audit?
Do you know what information or IT systems your vendors can
access?
Do you scrutinize vendor personnel practices?
12
#RSAC
And Most Importantly….
Does the IT Security Group participate in the
procurement process, vendor assessments and
vendor management?
What other groups should you be working with to
assure end-to-end cybersecurity?
13
#RSAC
What are best practices and tools to
manage supply chain cyber risks?
#RSAC
NIST Case Studies
Cisco
Boeing & Exostar
Schweitzer Engineering Laboratories
Exelon Corporation
John Deere
Intel Corporation
Smart Manufacturing Leadership
Coalition
Northrop Grumman Corporation
Fujitsu
FireEye
Dupont Crop Protection
Resilinc
Procter & Gamble
NetApp
Juniper Networks
Great River Energy
Utility Company
Communications Company
15
#RSAC
Findings from NIST Case Studies
Key Findings:
Existing tools to mitigate supply chain for quality,
integrity, security and continuity risks are also
relevant for cyber risks
Best practices and tools to mitigate cyber risks in the
supply chain are hiding in plain sight – often in other
parts of the company.
Synergies of solution are not well exploited.
16
#RSAC
Organizational Strategies to Manage Supply
Chain Cyber Risks
Many hands and different
functions affect cyber risks in
the supply chain.
Lack of communication and
cooperation creates risk blind
spots.
Sourcing
Security
QA
ERM R&D
ENG.
ITLegal
SC Risk Owners
17
#RSAC
Best SCRM Practice: Supply Chain Risk Council
Supply Chain Risk Councils bring together key players for a holistic
and end-to-end supply chain risk management strategy
18
#RSAC
Vendor Risk Assessment Tools
What? Risk ratings to assess and mitigate vendor performance
financial, security risks as well as corporate social responsibility
risks.
Synergies with Cyber Risks:
 Baseline security requirements for contracts
 Integrates security risks with other business risks in the up-front
selection process and ongoing audits.
19
#RSAC
Supply Chain Resiliency Tools
What? Databases identifying and mapping key suppliers at all
levels, components and critical chokepoints as well as prequalified
backup sources of supply and vendors
Synergies with Cyber Supply Chain Risk Management
Identifies lower tier suppliers
Validated sources of backup supply in the event of disruption,
reducing risk that poor quality or counterfeit goods enter SC.
20
#RSAC
Track and Trace Tools
What? Detailed information on parts and materials to ensure
quality, integrity and backstop warranties. Where it was built?
Who built it? What assembly line? What test station?
Cybersecurity Benefits
Visibility by part, supplier, production process down supply
chain
Anti-counterfeiting tools
Capability to distinguish between design flaws and deliberate
defects
21
#RSAC
Master Security Specification Framework
What? Master security specification customizes security
requirements to product, service or site.
Cybersecurity Benefits
Gives business units a full roadmap of security requirements
Eliminates inconsistencies across business units
Enables flexibility to deal with multiple supplier roles
22
#RSAC
Enterprise Risk Intelligence
What? Data collection center reviewing all sources, not just those
traditionally associated with information security
Server Event Logs Antivirus Logs
Endpoint Device Logs Personnel Information
Firewall Logs In-Scope Equipment
Data Collection &
Analysis
23
#RSAC
Resources: NIST Best Practice Case Studies
http://www.nist.gov/itl/csd/best-practices-in-cyber-
supply-chain-risk-management-october-1-2-2015.cfm
Disclaimer: "The identification of any commercial product or
trade name is included solely for the purpose of providing
examples of publicly-disclosed events, and does not imply any
particular position by the National Institute of Standards and
Technology."
24
#RSAC
Questions?
Jon Boyens
Program Manager, Cyber SCRM
National Institute for Standards and Technology
Jon.Boyens@nist.gov
Http://scrm.nist.gov
Thank
you!!

More Related Content

PPTX
Demand planning session
PDF
Introduction to Risk Management ISO31000:2009
PDF
Week 5 Risk Assessment
PDF
Digitizing the supply chain
PDF
Data integrity - Regulatory Perspective and Challenges:
PPTX
Unit 2 manufacturing system design
PPTX
Supply chain management & case study
Demand planning session
Introduction to Risk Management ISO31000:2009
Week 5 Risk Assessment
Digitizing the supply chain
Data integrity - Regulatory Perspective and Challenges:
Unit 2 manufacturing system design
Supply chain management & case study

What's hot (16)

PPTX
PDF
Electronic Batch Manufacturing records and MES in Pharmaceutical
PPTX
Concession presentation v01
PPTX
Iso 27001 isms presentation
PPTX
MIS in Walmart
PPTX
Warehouse Storage and Racks 2017
PDF
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
PPTX
Ikea Case study
PPT
FSSC 22000 training module V4.1 Sep 2017.ppt
PDF
Medical Risk Management
PPTX
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
PPTX
Ikea, building a sustainable supply chain
PPTX
Introduction to FAIR - Factor Analysis of Information Risk
PPTX
Gamp 5 overview by jaya prakash ra
PPTX
Haccp training slideshow 1
Electronic Batch Manufacturing records and MES in Pharmaceutical
Concession presentation v01
Iso 27001 isms presentation
MIS in Walmart
Warehouse Storage and Racks 2017
Understanding Legal Technology Competence with Bob Ambrogi and Joshua Lenon
Ikea Case study
FSSC 22000 training module V4.1 Sep 2017.ppt
Medical Risk Management
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
Ikea, building a sustainable supply chain
Introduction to FAIR - Factor Analysis of Information Risk
Gamp 5 overview by jaya prakash ra
Haccp training slideshow 1
Ad

Similar to Integrating Cybersecurity into Supply Chain Risk Management (20)

PDF
Cybersec Supply Chain Risks and Governance v0.1.pdf
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
Company Profile
PDF
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
DOCX
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
PDF
Embedded Systems Security: Building a More Secure Device
PDF
Embedded Systems Security: Building a More Secure Device
PDF
Building an Effective Supply Chain Security Program
PDF
Securing 100 products - How hard can it be?
PDF
Software Supply Chain Security Management
PDF
Penetration testing 5 reasons Why Organizations Should Adopt it
PPT
Bank World 2008 Kamens 04 29 08
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PDF
Webinar misra and security
PDF
2024_USA24_SIR-R01_01_Top-10-Security-Products-That-Would-Be-Elevated-or-Elim...
PDF
CyberSecurity Update Slides
PDF
Why Penetration Tests Are Important Cyber51
PDF
What Is Next-Generation Endpoint Security and Why Do You Need It?
PDF
Didiet Cybersecurity Consultant Portfolio - English
DOCX
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P
Cybersec Supply Chain Risks and Governance v0.1.pdf
Cybersecurity roadmap : Global healthcare security architecture
Company Profile
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
BSA425 v1.3Supporting Research ReportBSA425 v1.3Page 2 of
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
Building an Effective Supply Chain Security Program
Securing 100 products - How hard can it be?
Software Supply Chain Security Management
Penetration testing 5 reasons Why Organizations Should Adopt it
Bank World 2008 Kamens 04 29 08
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Webinar misra and security
2024_USA24_SIR-R01_01_Top-10-Security-Products-That-Would-Be-Elevated-or-Elim...
CyberSecurity Update Slides
Why Penetration Tests Are Important Cyber51
What Is Next-Generation Endpoint Security and Why Do You Need It?
Didiet Cybersecurity Consultant Portfolio - English
BSA425 v1.3Project Plan DraftBSA425 v1.3Page 11 of 11P
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
A Presentation on Touch Screen Technology
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
project resource management chapter-09.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
WOOl fibre morphology and structure.pdf for textiles
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
1. Introduction to Computer Programming.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
1 - Historical Antecedents, Social Consideration.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A Presentation on Touch Screen Technology
SOPHOS-XG Firewall Administrator PPT.pptx
Hindi spoken digit analysis for native and non-native speakers
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Zenith AI: Advanced Artificial Intelligence
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Web App vs Mobile App What Should You Build First.pdf
project resource management chapter-09.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Programs and apps: productivity, graphics, security and other tools
Enhancing emotion recognition model for a student engagement use case through...
NewMind AI Weekly Chronicles - August'25-Week II

Integrating Cybersecurity into Supply Chain Risk Management

  • 1. SESSION ID: #RSAC Integrating Cybersecurity Into Supply Chain Risk Management GRC-W03 Jon Boyens Program Manager, Cyber SCRM National Institute for Standards and Technology
  • 2. #RSAC What does Cybersecurity Have to Do with Supply Chains Anyway?
  • 3. #RSAC ICT and Non-ICT External Dependencies ENTITY Up Stream Non- ICT Partne rs Down Stream Non- ICT Partne rs ICT Supply Chain (ICT Products & Services) Non-ICT Products & Service Non-ICT Products & Service ICT Supply Chain (ICT Products & Services) TRUST -Organization -Process -Products/Service But Verify -Due Diligence -Standards/Audits -Testing 3
  • 4. #RSAC Anatomy of Cyber Supply Chain Risk Inbound Supply Chain: Risks from Suppliers Unwanted Functionality Info/Network Breaches Supplier Insider Threats Manufacturing/ SC Risks Theft/alteration of data Compromise of SC business SW Compromise of control systems, test or other equipment. Disruptions in vetted suppliers Outbound Supply Chain Theft/Tampering Counterfeits Product Design Design Flaws 4
  • 5. #RSAC How Did We Get Here? Cyber • Growing sophistication of ICT • Number and scale of information systems • Increasing reliance on COTS Supply Chain • Speed and scale of globalization • Complex supply chain (logically long and geographically diverse) Risk • Significant increase in the number of entities who ‘touch’ products and services • Natural disasters, poor product/service quality and poor security practices Manag ement • Lack of visibility and understanding: how technology is developed, integrated and deployed and practices to assure security. • A lack of control of the decisions impacting the inherited risks and ability to effectively mitigate those risks. 5
  • 6. #RSAC No End in Sight for Supply Chain Cyber Risks Three trends are exacerbating cyber risks to supply chains:  Internet of Things: everything is smart and interconnected  IT-enabled Supply Chain Management: product and supply chain data run on top of business software that connects supply chains – and weak links abound globally  3-D Printing: production is going viral and digital. 6
  • 7. #RSAC Cyber Supply Chain Risks Emerge At Every Stage What Can Happen? Delivery of poor quality, compromised or counterfeit products that diminish brand reputation Loss of intellectual property shared with supply chain partners Access to company IT networks, customer information or operational control systems through supplier access Impact on revenues, brand reputation and shareholder value 7
  • 8. #RSAC What Does Supply Chain Have to Do with Cyber Risks? 80% of all info breaches originate in the supply chain 45% of all cyber breaches were attributed to past partners 72% of companies do NOT have full visibility into their supply chains 59% of companies do NOT have a process for assessing cybersecurity of third party providers with which they share data or networks 40% of attack campaigns targeted manufacturing and service sectors (20% each). 8
  • 9. #RSAC Supply Chain Disruptions are Costly! 98% of manufacturers will experience a supply chain disruption in the next 2 years (80% for all firms) 55% of disruptions cost over $25 million 53% of disruptions caused from unplanned IT/Comms outage 24% of disruptions caused from cyber attacks 22% of disruptions caused from data breaches Need More? 9
  • 10. #RSAC What’s the Risk? For Example…. Supplier-provided keyboard software gave hackers access to owner data on 600 million Samsung Galaxy phones Supplier-provided advertising SW tampered with computer security so that attackers could snoop on browser traffic on Lenovo computers. Poor information security by service suppliers led to data breaches at Target, Home Depot, Goodwill….and many others. 10
  • 11. #RSAC Match the Supplier with the Compromised Customer Suppliers Customers Maroochy Cisco Fiat/Jeep T-Mobile Data breach of Tech Certification firm exposed personnel data on employees of client company Hack of credit check database exposed new customer PPI. Supplier entertainment system enabled remote take- over of controls in a car. Uncancelled credentials of former contractor enabled unauthorized sewage release from water treatment plant. 11
  • 12. #RSAC Ask Yourself the Following Can you identify the sub-tier suppliers for critical IT components or software embedded in your products and systems? Is cyber risk part of vendor selection, management and audit? Do you know what information or IT systems your vendors can access? Do you scrutinize vendor personnel practices? 12
  • 13. #RSAC And Most Importantly…. Does the IT Security Group participate in the procurement process, vendor assessments and vendor management? What other groups should you be working with to assure end-to-end cybersecurity? 13
  • 14. #RSAC What are best practices and tools to manage supply chain cyber risks?
  • 15. #RSAC NIST Case Studies Cisco Boeing & Exostar Schweitzer Engineering Laboratories Exelon Corporation John Deere Intel Corporation Smart Manufacturing Leadership Coalition Northrop Grumman Corporation Fujitsu FireEye Dupont Crop Protection Resilinc Procter & Gamble NetApp Juniper Networks Great River Energy Utility Company Communications Company 15
  • 16. #RSAC Findings from NIST Case Studies Key Findings: Existing tools to mitigate supply chain for quality, integrity, security and continuity risks are also relevant for cyber risks Best practices and tools to mitigate cyber risks in the supply chain are hiding in plain sight – often in other parts of the company. Synergies of solution are not well exploited. 16
  • 17. #RSAC Organizational Strategies to Manage Supply Chain Cyber Risks Many hands and different functions affect cyber risks in the supply chain. Lack of communication and cooperation creates risk blind spots. Sourcing Security QA ERM R&D ENG. ITLegal SC Risk Owners 17
  • 18. #RSAC Best SCRM Practice: Supply Chain Risk Council Supply Chain Risk Councils bring together key players for a holistic and end-to-end supply chain risk management strategy 18
  • 19. #RSAC Vendor Risk Assessment Tools What? Risk ratings to assess and mitigate vendor performance financial, security risks as well as corporate social responsibility risks. Synergies with Cyber Risks:  Baseline security requirements for contracts  Integrates security risks with other business risks in the up-front selection process and ongoing audits. 19
  • 20. #RSAC Supply Chain Resiliency Tools What? Databases identifying and mapping key suppliers at all levels, components and critical chokepoints as well as prequalified backup sources of supply and vendors Synergies with Cyber Supply Chain Risk Management Identifies lower tier suppliers Validated sources of backup supply in the event of disruption, reducing risk that poor quality or counterfeit goods enter SC. 20
  • 21. #RSAC Track and Trace Tools What? Detailed information on parts and materials to ensure quality, integrity and backstop warranties. Where it was built? Who built it? What assembly line? What test station? Cybersecurity Benefits Visibility by part, supplier, production process down supply chain Anti-counterfeiting tools Capability to distinguish between design flaws and deliberate defects 21
  • 22. #RSAC Master Security Specification Framework What? Master security specification customizes security requirements to product, service or site. Cybersecurity Benefits Gives business units a full roadmap of security requirements Eliminates inconsistencies across business units Enables flexibility to deal with multiple supplier roles 22
  • 23. #RSAC Enterprise Risk Intelligence What? Data collection center reviewing all sources, not just those traditionally associated with information security Server Event Logs Antivirus Logs Endpoint Device Logs Personnel Information Firewall Logs In-Scope Equipment Data Collection & Analysis 23
  • 24. #RSAC Resources: NIST Best Practice Case Studies http://www.nist.gov/itl/csd/best-practices-in-cyber- supply-chain-risk-management-october-1-2-2015.cfm Disclaimer: "The identification of any commercial product or trade name is included solely for the purpose of providing examples of publicly-disclosed events, and does not imply any particular position by the National Institute of Standards and Technology." 24
  • 25. #RSAC Questions? Jon Boyens Program Manager, Cyber SCRM National Institute for Standards and Technology [email protected] Http://scrm.nist.gov Thank you!!