The Center for Advance Logistics Management is pleased to host a two-day conference on Supply Chain Innovations on Feb. 22 and 23, 2012 in Savannah, GA. The conference is an outgrowth of on-going research and education efforts by Albany State University, partnered with Albany Technical College.
The conference will be held at the Marriott Savannah Riverfront. The conference theme is “Leveraging technology for security, resilience and optimization in Defense supply chains.”
Information technology is being leveraged to provide enormous competitive advantage in globally connected supply chains. Technology is a source of innovation and competitive advantage, but it also makes supply chains vulnerable to cyber threats.
Advanced supply chains recognize and manage risk, and build security and resilience while they optimize performance.
IT underpins all of the elements of supply chain management. Sharing of information across processes in the supply chain affect everything from materials extraction and sourcing through manufacturing, transportation, distribution, finance, payments, security and customer relations.
The Department of Defense relies heavily on private-sector infrastructure for its supply chains.
While supply chains move materials through normal distribution channels (air, sea and land-based shipping), supply chain information travels on the Internet. Today we know that security and resiliency in information and communications infrastructures is insufficient, resulting in serious vulnerabilities for supply chains.
The risks and vulnerabilities in an improperly managed supply chain, from counterfeit equipment to malware to other avenues of attack, are real and growing. The Defense Department, through efforts such as the Trusted Foundry program and use of standards like Common Criteria (ISO/IEC 15408) is working to reduce its supply chain vulnerability footprint. This is not a small problem. Some have recommended government measures that mandate significant consequences for having inadequate cyber protections and requirements for reporting breaches and penetrations.
DoD programs that are mission critical or essential to national security or national defense have stepped up the requirements for compliance with DoD directives and Public Law requiring trusted components in the most important defense systems.
Agencies and departments are developing policies to keep a more watchful eye on vendors, partners, and others in their cyber supply chains and adopt best practices for mitigating risks across their systems and processes to protect your system against backdoor access or other deliberate mischief.
Complete confeence information, including registration details, may be found at http://www.afei.org/events/2A08/Pages/default.aspx.