SCRM Library Updates
Managing supply chain resilience assessment model-relevant factors and activities using an FCM-FBWM approach
Supply chain resilience is essential for companies to survive in today’s competitive market, as they face environmental and unforeseeable challenges in…
Same destination, different roadmaps: the journey to zero trust architecture
While all federal agencies are striving to reach the same place, no two agencies are taking the same path to…
President Biden Formalizes White House Council on Supply Chain Resilience
On June 14, 2024, President Biden issued an Executive Order on White House Council on Supply Chain Resilience (the “Order”). The Order,…
Executive Order on White House Council on Supply Chain Resilience
By the authority vested in me as President by the Constitution and the laws of the United States of America,…
The role of technology in supply chain risk management: Innovations and challenges in logistics
The paper explores the myriad of risks faced by modern supply chains, ranging from natural disasters and geopolitical tensions to…
Building resilient supply chains: Empirical evidence on the contributions of ambidexterity, risk management, and analytics capability
Supply chain disruptions are a major managerial issue due to their detrimental effects on businesses and supply chain networks. Organizations…
Recent SCRM News
FBI, CISA say Chinese hackers are still lurking in US telecom systems
Leading U.S. cybersecurity agencies on Tuesday said that Chinese hackers likely still have access to critical telecommunications systems, and published…
Homeland Security Committee reveals Cyber Threat Snapshot on rising cyber threats from nation-states, hacker networks
The U.S. House Committee on Homeland Security published a new ‘Cyber Threat Snapshot’ examining growing threats posed by malign nation-states…
LastPass warns of fake support centers trying to steal customer data
LastPass is warning about an ongoing campaign where scammers are writing reviews for its Chrome extension to promote a fake…
Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems
Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet,…
14 Million Patients Impacted by US Healthcare Data Breaches in 2024
Over 14 million patients have been affected by data breaches caused by malware attacks on US healthcare organizations so far…
Managing supply chain resilience assessment model-relevant factors and activities using an FCM-FBWM approach
Supply chain resilience is essential for companies to survive in today’s competitive market, as they face environmental and unforeseeable challenges in…
SCRM Events
Defend Against Ransomware Attacks Cyber Range Training
Tuesday, January 7, 2025 Time: 9:00 AM EST – 1:00 PM EST Location type: Virtual/Online Format: Webinar The Cybersecurity and…
Federal Executive Forum Zero Trust Strategies in Government Progress and Best Practices 2024
Dec 3, 2024 1:00 p.m. ET Type: Webinar How far have agencies progressed in their zero trust journey, and how have…
Cybersecurity in the cloud: Visibility, monitoring and compliance
Join us for a panel discussion on advancing cloud security where we’ll explore how agencies are strengthening their cybersecurity posture…
Federal News Network’s Risk & Compliance Exchange 2024
Nov 18, 2024 1:00 p.m. ET Type: Webinar A lot of preparation and planning is underway in response to the new…
Cloud-enabled government: Seamless & secure data access
Join us for a webinar on enterprise cloud adoption in federal agencies, where we’ll explore the factors driving cloud adoption…
SPACE ISAC HOSTS FIFTH ANNUAL VALUE OF SPACE SUMMIT, CO-HOSTED BY THE AEROSPACE CORPORATION
Slated for September 24-25, in Colorado Springs, the summit will focus on geopolitical, economic, and cybersecurity impacts on global space.…