A Maturity Model for supply chain risk management

Purpose

Supply chains are among the most important, complex and risky systems in the modern world. Thus, managing risk is no longer an option, but a fundamental process in organizations. Given the lack of pathways that guide companies toward supply chain risk management (SCRM), the purpose of this study is to provide a conceptual reference, in the form of a maturity model, to support them in the evolution and improvement of this process.

Design/methodology/approach

The proposal covered a broad literature review, a survey and a multiple case study. The research was conducted in the aerospace industry and included companies from the supply chain of a leading aircraft manufacturer.

Findings

The model elaborated with the research results has eight attributes and four levels, addressing critical issues for SCRM to achieve its scope and purposes. The attributes include the structuring and scope of the SCRM process, the importance it receives within the organization, the resources used and the qualification of employees, the role of leadership and the inter-organizational collaboration.

Practical implications

Managing risk along supply chains is particularly challenging, demands resources and knowledge and requires a continuous effort. The proposed model offers a reference for improvement, helping to identify areas that need to be strengthened and practices to be implemented. Thus, it can guide the focus and efforts in a more efficient and systematic way, in addition to support evaluations and comparisons.

Originality/value

Although maturity models are abundant in different fields and several are available for risk management, models specifically developed for SCRM are scarce. This study broadens the understanding of SCRM with novel insights about how to improve this process in an evolutionary way. While many researchers focused their efforts on the SCRM process steps, this study identified critical issues that transcend these steps. The research was carried out in a sector with a long tradition in risk management and included companies belonging to a same supply chain, that is, using an approach still little explored in studies on SCRM or risk management maturity models.

Read Full Publication

Critical Infrastructure Protection and Resilience North America (CIPRNA) Conference

Tuesday, March 12, 2024 – Thursday, March 14, 2024

Location type: In-person

Location: Lake Charles LA

Event type: Conference

CISA is exhibiting and speaking at the Critical Infrastructure Protection and Resilience North America (CIPRNA) Conference on March 12-14, 2024, in Lake Charles, LA. This three-day event will feature speakers from CISA and bring together leading stakeholders from industry, operators, agencies and governments to collaborate on the issues and the threats securing North America.

Register Now

Zero-day, supply-chain attacks drove data breach high for 2023

Zero-day exploits, supply chain attacks fuel 72% increase over previous record for incidents of compromise. Another increase is expected for 2024.A new record for data breaches reported to the Identity Theft Resource Center (ITRC) was set in 2023, spurred by zero-day and supply chain attacks, according to the organization’s annual data breach report released Thursday. The report noted that the number of data compromises in 2023 jumped 78% over 2022, to 3,205 from 1,801 and exceeded, by 72%, the previous high of 1,860 breaches recorded in 2021.

Read Full Article

Chips Trade War ‘Will See Surge in E-Recycling’ – Deloitte

In its Tech, Media and Telecom Predictions 2024 report, Deloitte says the supply chain sector will face “significant” raw material shortages, particularly gallium and germanium – vital minerals needed for chip manufacturing.

Deloitte says that interest in electronic waste (e-waste) recycling is likely to grow in response to these shortages. E-waste recycling is the disassembly and separation of components and raw materials of waste electronics from devices such as PCs and mobile phones.

Read Full Article

States and Congress Wrestle With Cybersecurity After Iran Attacks Small Town Water Utilities

The tiny Aliquippa water authority in western Pennsylvania was perhaps the least-suspecting victim of an international cyberattack.

It had never had outside help in protecting its systems from a cyberattack, either at its existing plant that dates to the 1930s or the new $18.5 million one it is building.

Then it — along with several other water utilities — was struck by what federal authorities say are Iranian-backed hackers targeting a piece of equipment specifically because it was Israeli-made.

Read Full Article

AI-based evaluation system for supply chain vulnerabilities and resilience amidst external shocks: An empirical approach

The study focuses on the intricacies and vulnerabilities inherent in supply chains, which are often influenced by external disruptions such as pandemics, conflict scenarios, and inflation. The aim is to devise an AI-driven system that can accurately appraise these intricacies within the domain and mitigate their vulnerabilities effectively. The work employs an empirical approach utilizing datasets from various studies for developing Machine Learning (ML) and Deep Learning (DL) models. 

Read Full Paper