"National Supply Chain Integrity Month: Campaign to Raise Awareness of Supply Chain Threats and Mitigation"

April is National Supply Chain Integrity Month. The National Counterintelligence and Security Center (NCSC) is partnering with government and industry partners throughout April for the 4th annual National Supply Chain Integrity Month to encourage organizations across the US to take action to bolster their supply chains against foreign adversaries and other risks. NCSC is working with the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA), the National Association of State Procurement Officials (NASPO), the Department of Defense's Center for the Development of Security Excellence (CDSE), the National Association of Counties (NACo), the Federal Communications Commission (FCC), and others to increase awareness among organizations about threats facing US supply chains as well as to share information on how to mitigate risks. The recent software supply chain attacks on the US industry and government have brought further attention to the importance of improving our supply chains' resilience, security, and diversity. The exploitation of vulnerabilities in US supply chains by foreign adversaries present unique security threats. State-sponsored hackers have targeted software and Information Technology service supply chains to conduct espionage, steal intellectual property, and more. NCSC encourages organizations to consider diversifying supply chains, mitigating third-party risks, identifying and prioritizing essential assets, ensuring executive-level commitment, and strengthening partnerships in order to enhance the resilience of their supply chains. This article continues to discuss the goal of National Supply Chain Integrity Month, the exploitation of US supply chains by foreign adversaries, and what organizations should do to improve the resilience of their supply chains. 

HSToday reports "National Supply Chain Integrity Month: Campaign to Raise Awareness of Supply Chain Threats and Mitigation"

Submitted by Anonymous on