CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◆ Security Tools & Reviews Apr 03, 2026

Cybersecurity as a major supply chain risk domain - Supply Chain Management Review

Supply Chain Management Review Archived Apr 03, 2026 ✓ Full text saved

Cybersecurity as a major supply chain risk domain Supply Chain Management Review

Full text archived locally
✦ AI Summary · Claude Sonnet


    Don't Miss: NextGen 2026 awards are open. Show your results—submit your entry today. Enter today Cybersecurity as a major supply chain risk domain The digitization and interconnectedness of business is increasing the risk of cyberattacks, regardless of the level of security employed Seongkyoon Jeong · August 5, 2024 · Editor’s Note: This is the first in a series on Cybersecurity in Supply Chains by SK Jeong, a University of Tennessee professor and digital supply chain researcher experienced in detecting vulnerabilities in software systems and economic impact of cyberattacks. He explores why cybersecurity matters to supply chain managers and what fundamental strategies managers should take. You can find the original post on the University of Tennessee Global Supply Chain Institute’s blog, where supply chain professionals can find essential reading from leading researchers and scholars on the latest trends and topics relevant to global supply chain management. With the digitalization of business, cyberattacks have become a top risk. These attacks occur more frequently and cause significant losses in business value. Recognizing the severity of the risk they’re exposed to, leading companies have enhanced their cybersecurity measures. However, building a so-called security fortress does not prevent cyberattacks entirely. Instead of directly attacking well-protected target companies, cyber-attackers will often exploit suppliers with weaker protections to gain access and harm their primary targets. Related content Leadership development for supply chain leaders Five critical challenges facing supply chain planning talent and leadership development 11 core competencies critical for today’s supply chain planners Five organizational action areas for developing supply chain talent A prominent example of a supply chain cyberattack is the 2020 SolarWinds incident. SolarWinds offers Orion software, an IT infrastructure tool used to monitor, analyze, and manage corporate IT systems. State-sponsored hackers infiltrated the software, inserting malicious code into a scheduled update. Customers, including U.S. federal agencies, state and local governments, and major corporations, were compromised when they executed the update. This breach affected around 18,000 SolarWinds customers. For over a decade, scholars like me have documented the rising pattern of cyberattacks channeled through the supply base. What we began observing in the early 2010s accelerated with the COVID-19 pandemic. As the world moved online, the rapid and necessary adoption of digital tools, active use of digital services, and improved digital connectivity with suppliers increased business productivity but also induced more cyberattacks through the supply chain. Importance of integrating  cybersecurity into supply management A primary reason the supply chain is leveraged for cyberattacks is suppliers’ weak cybersecurity levels. Despite the rising risk, suppliers—often smaller companies—do not have sufficient measures to protect themselves against attacks. With fewer operational resources and limited capabilities, they’re left exposed. Even when made aware of the importance of cybersecurity, suppliers place more emphasis on key operational performance measures like speed and cost than cybersecurity-related measures. This inclination within supply management is akin to other emerging issues in the discipline (e.g., sustainability in the supply base). Supply management thus plays an essential role in securing against cyberattacks. Cybersecurity must be integrated into the supplier selection process, and continuous supplier development in cybersecurity is necessary. After all, in today’s digitally connected environment, companies can remain vulnerable to cyberattacks originating from their supply chains regardless of their own defense level. In that regard, supply managers must take a leadership role in cybersecurity, orchestrating their supply chains in the same way they do when facing other key business issues. Understanding the digital supply chain for cybersecurity Like physical products, most software products are not built by a single supplier. They consist of multiple modules, potentially made of sublevel modules, forming “software supply chains.” Companies embedded in software supply chains face challenges akin to those in conventional supply chains. While recent studies consistently reveal that a significant portion of software modules rely on vulnerable components within their supply chains, it is difficult to map what constitutes a software supply chain below the first-tier supplier/module and how a software supply chain evolves over time. This challenge becomes more serious when hackers exploit vulnerabilities in a low-tier supplier/module in software supply chains. In 2021, for example, Log4J, an obscure but widely used software that records computer system activities, was exploited through a security vulnerability that allowed malicious attackers to infiltrate the system without using valid passwords. Digital goods, by nature, can be readily and instantaneously accessed from the outside. As new vulnerabilities are disclosed, hackers may exploit them before they are resolved. Software products using vulnerable modules in their supply chains remain at risk of cyberattacks unless these issues are addressed. Recent developments and best practices In response to the rising risk of cyberattacks, government agencies and industry organizations have developed frameworks that supply chain managers should adopt. Similar to traditional Bill of Materials practice, the Software Bill of Materials (SBOM) details the required software modules for a product. This helps organizations understand the components within their software, allowing for better tracking of potential vulnerabilities and responsive mediation of emerging issues in the software supply chain. There is also a government-level movement toward creating standardized frameworks for managing supply chain cybersecurity. For example, the National Institute of Standards and Technology (NIST) released a Cybersecurity Supply Chain Risk Management framework, which underscores the issue’s importance and provides a systematic approach to helping companies consider factors involved in supply chain cybersecurity. Beyond technical tools, managerial attention to potential cybersecurity concerns is crucial. Cyberattack strategies evolve as hackers and defenders interact, meaning no permanent solutions can exist. Collective and responsive actions across organizational boundaries can mitigate the impact of potential cybersecurity risks. For instance, despite the severity of the log4j vulnerability, many companies and communities were proactive in addressing the issue collectively, effectively minimizing the ramifications. In the next post, we will explore recent supply chain cyberattack cases and what lessons we can learn from them. About the Global Supply Chain Institute The University of Tennessee's Global Supply Chain Institute (GSCI) is the preeminent hub for supply chain thought leadership and talent development. The pinnacle of GSCI’s efforts is UT’s Supply Chain Forum, which brings together more than 80 of the world’s most innovative and impactful companies twice a year to learn, network, and recruit the country’s top supply chain talent.  SC MR (Photo: Getty Images) Similar to traditional Bill of Materials practice, the Software Bill of Materials details the required software modules for a product, helping organizations understand the components within their software and better track vulnerabilities. Subscribe to our weekly e-mail update Don’t miss out on the best in supply chain. Get premium resources and in-depth, comprehensive feature articles written by the industry's top experts – delivered. Subscribe! More Cyber Security Securing the defense supply chain: Critical insights on CMMC 2.0 preparedness Analyzing the supply chain risks behind the top data breaches in 2024 Regulations are forcing organizations to address software supply chain security The 3 types of cyberattacks affecting global supply chains Cybersecurity as a major supply chain risk domain More Cyber Security What's Related in Cyber Security Explore Software & Technology Explore Topics News Software & Technology Artificial Intelligence Cloud Software Education Cyber Security Cyberattacks Digitization Supply Chain Security Software & Technology News NextGen revamps awards for 2026, opens submissions Why a secure industrial supply chain depends on layered AI The future of forecast value add: An expert’s AI agent framework transforming e-commerce forecasting ‘Physical AI’ is transforming warehouse operations beyond traditional visibility Three ways AI can help CSCOs navigate emerging supply chain cost pressures ‘AI is eating software’ and it is redefining supply chain decision-making as a result More Software & Technology Latest Software & Technology Resources Talking Supply Chain: Is AI expanding cyber risk? Talking Supply Chain: Why automation feasibility should guide supply chain decisions More resources Subscribe Supply Chain Management Review delivers the best industry content. Subscribe today and get full access to all of Supply Chain Management Review’s exclusive content, email newsletters, premium resources and in-depth, comprehensive feature articles written by the industry's top experts on the subjects that matter most to supply chain professionals. Subscribe today Editors’ Picks NextGen revamps awards for 2026, opens submissions The NextGen Supply Chain Conference has revamped its 2026 awards to emphasize… ‘AI is eating software’ and it is redefining supply chain decision-making as a result Agentic AI is transforming supply chains from deterministic, rule-based… What’s the missing ingredient in supply chain visibility? True supply chain visibility in 2026 depends less on tracking shipments and… What It Really Means: Balancing demand and supply Balancing demand and supply in supply chain planning means aligning demand… Supply Chain Management Review About Us Subscribe to Supply Chain Management Review Magazine Get digital edition Get newsletters Get article reprints Magazine archive About us Contact us Editorial team Contributing to SCMR Advertise with us Privacy policy Peerless Network Supply Chain Management Review Modern Materials Handling Logistics Management Supply Chain 24/7 Material Handling 24/7 Robotics 24/7 Digital Engineering 24/7 Peerless Media Peerless Content Creation Peerless Research Featured Podcast: Talking Supply Chain: Rethinking supplier relationships Webinar: Garbage In, AI Out: Why Data Discipline Drives Supply Chain Optimization News: Automation is the easy part: The real AI shift in procurement starts now News: Tractor Supply to receive NextGen Supply Chain Visionary Award Artificial Intelligence: Automation is the easy part: The real AI shift in procurement starts now NextGen Supply Chain Conference: Tractor Supply to receive NextGen Supply Chain Visionary Award Research: Supply chain salaries, job satisfaction on the rise Research: Supply Chain’s Top Trends for 2024 Require Talent Investment for Success Explore more © Copyright 2026 Supply Chain Management Review, a division of Peerless Media. All Rights Reserved. × Search Search Sourcing & Procurement Inventory Management Risk Management Global Trade Ports & Shipping Business Management Supply Chain TMS WMS 3PL Government & Regulation Sustainability Finance Software & Technology Artificial Intelligence Automation Cloud IoT Robotics Software The Academy Executive Education Associations Institutions Universities & Colleges Resources Podcasts Webinars Companies Visionaries White Papers Special Reports Premiums Magazine Archive Subscribe SCMR Magazine Newsletters Magazine Archives Customer Service Press Releases Press Releases Submit Press Release
    💬 Team Notes
    Article Info
    Source
    Supply Chain Management Review
    Category
    ◆ Security Tools & Reviews
    Published
    Apr 03, 2026
    Archived
    Apr 03, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗