SCRM Library Updates
Managing supply chain resilience assessment model-relevant factors and activities using an FCM-FBWM approach
Supply chain resilience is essential for companies to survive in today’s competitive market, as they face environmental and unforeseeable challenges in…
Same destination, different roadmaps: the journey to zero trust architecture
While all federal agencies are striving to reach the same place, no two agencies are taking the same path to…
President Biden Formalizes White House Council on Supply Chain Resilience
On June 14, 2024, President Biden issued an Executive Order on White House Council on Supply Chain Resilience (the “Order”). The Order,…
Executive Order on White House Council on Supply Chain Resilience
By the authority vested in me as President by the Constitution and the laws of the United States of America,…
The role of technology in supply chain risk management: Innovations and challenges in logistics
The paper explores the myriad of risks faced by modern supply chains, ranging from natural disasters and geopolitical tensions to…
Building resilient supply chains: Empirical evidence on the contributions of ambidexterity, risk management, and analytics capability
Supply chain disruptions are a major managerial issue due to their detrimental effects on businesses and supply chain networks. Organizations…
Recent SCRM News
Space supply chain gaps: Propulsion, hardened electronics and laser links
Despite ongoing efforts by the Defense Department to bolster the space supply chain, government and commercial satellite programs continue to struggle…
US congressional panel urges Americans to ditch China-made routers
A U.S. congressional committee on Wednesday urged Americans to remove Chinese-made wireless routers from their homes, including those made by…
nRootTag: 1.5 Billion iPhones Used for Malicious Tracking
According to the researchers, a complete fix could take several years, as Apple would need to update all Find My-compatible…
Protecting Your Software Supply Chain: Assessing the Risks Before Deployment
Cybercriminals have recognized that instead of attacking an organization head-on, they can infiltrate through the software supply chain—like slipping counterfeit…
Cloudflare CDN flaw leaks user location data, even through secure chat apps
A security researcher discovered a flaw in Cloudflare’s content delivery network (CDN), which could expose a person’s general location by simply…
WH National Cyber Director Finalizing Software Liability Proposals
The outgoing White House national cyber director is highlighting the progress his office made over the last four years, while…
SCRM Events
OSINT Unveiled: The Technology Behind the Intelligence – ODNI Edition
Feb 27, 2025 2:00 p.m. ET – Webinar Join us for a discussion on the evolving role of OSINT in national…
Federal Executive Forum Cybersecurity for Defense and Homeland Progress and Best Practices 2025
Government cybersecurity strategies are constantly evolving to address new threats. The Departments of Defense and Homeland Security prioritize proactive defense,…
Federal News Network’s Industry Exchange Cyber 2025
Jan 27, 2025 1:00 p.m. ET Webinar Cybersecurity requires constant vigilance but also continual evolution. Are you staying safe today…
Defend Against Ransomware Attacks Cyber Range Training
Tuesday, January 7, 2025 Time: 9:00 AM EST – 1:00 PM EST Location type: Virtual/Online Format: Webinar The Cybersecurity and…
Federal Executive Forum Zero Trust Strategies in Government Progress and Best Practices 2024
Dec 3, 2024 1:00 p.m. ET Type: Webinar How far have agencies progressed in their zero trust journey, and how have…
Cybersecurity in the cloud: Visibility, monitoring and compliance
Join us for a panel discussion on advancing cloud security where we’ll explore how agencies are strengthening their cybersecurity posture…