The paper explores the myriad of risks faced by modern supply chains, ranging from natural disasters and geopolitical tensions to cyber threats and disruptions in global trade patterns. It investigates how technological innovations such as blockchain, Internet of Things (IoT), artificial intelligence (AI), and predictive analytics are reshaping traditional risk management approaches by providing real-time visibility, data-driven insights, and proactive mitigation strategies.
Building resilient supply chains: Empirical evidence on the contributions of ambidexterity, risk management, and analytics capability
Supply chain disruptions are a major managerial issue due to their detrimental effects on businesses and supply chain networks. Organizations must develop a resilient strategy, which is the ability to survive, adapt, and grow during all kinds of disruptions. The main purpose of this research is to empirically validate the impact of supply chain (SC) ambidexterity and risk management, on SC resilience and the mediating effect of SC analytics capability on their relationship.
STAR: Shining Light on Space Supply Chain Risk
Ronald Birk, Lori W. Gordon, and Eleanor Mitch outline the factors behind the need for a system that dynamically updates space supply chain information. Along with higher demand, there is competition among sectors, such as medical device and auto makers, for certain commodities and many rare earth elements. The authors propose a distributed ledger technology (DLT) system called “Space supply chain Topology for Assessing Risk (STAR)” that would create a nexus for all stakeholders in the space supply chain community.
A Maturity Model for supply chain risk management
Purpose
Supply chains are among the most important, complex and risky systems in the modern world. Thus, managing risk is no longer an option, but a fundamental process in organizations. Given the lack of pathways that guide companies toward supply chain risk management (SCRM), the purpose of this study is to provide a conceptual reference, in the form of a maturity model, to support them in the evolution and improvement of this process.
Design/methodology/approach
The proposal covered a broad literature review, a survey and a multiple case study. The research was conducted in the aerospace industry and included companies from the supply chain of a leading aircraft manufacturer.
Findings
The model elaborated with the research results has eight attributes and four levels, addressing critical issues for SCRM to achieve its scope and purposes. The attributes include the structuring and scope of the SCRM process, the importance it receives within the organization, the resources used and the qualification of employees, the role of leadership and the inter-organizational collaboration.
Practical implications
Managing risk along supply chains is particularly challenging, demands resources and knowledge and requires a continuous effort. The proposed model offers a reference for improvement, helping to identify areas that need to be strengthened and practices to be implemented. Thus, it can guide the focus and efforts in a more efficient and systematic way, in addition to support evaluations and comparisons.
Originality/value
Although maturity models are abundant in different fields and several are available for risk management, models specifically developed for SCRM are scarce. This study broadens the understanding of SCRM with novel insights about how to improve this process in an evolutionary way. While many researchers focused their efforts on the SCRM process steps, this study identified critical issues that transcend these steps. The research was carried out in a sector with a long tradition in risk management and included companies belonging to a same supply chain, that is, using an approach still little explored in studies on SCRM or risk management maturity models.
AI-based evaluation system for supply chain vulnerabilities and resilience amidst external shocks: An empirical approach
The study focuses on the intricacies and vulnerabilities inherent in supply chains, which are often influenced by external disruptions such as pandemics, conflict scenarios, and inflation. The aim is to devise an AI-driven system that can accurately appraise these intricacies within the domain and mitigate their vulnerabilities effectively. The work employs an empirical approach utilizing datasets from various studies for developing Machine Learning (ML) and Deep Learning (DL) models.
CISA Releases One Industrial Control Systems Advisory
CISA released one Industrial Control Systems (ICS) advisory on May 30, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-23-150-01 Advantech WebAccess/SCADA
CISA encourages users and administrators to review the newly released ICS advisory for technical details and mitigations.
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on May 9, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-23-129-02 Hitachi Energy MSM
- ICSA-21-334-02 Mitsubishi MELSEC and MELIPC Series (Update F)
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on April 25, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
Developing Supply Chain Capabilities Through Digitalization and Viability for Controlling the Ripple Effect
The COVID-19 pandemic affected all industries and presented manufacturing firms with enormous challenges, with considerable changes in consumer demand for goods and services. Supply chain management disruption caused by the COVID-19 outbreak resulted in several socio-economic roadblocks. The slow propagation of disruption risk results in a ripple effect along the entire chain. The lack of resilience and risk management capability is the prime cause, attributed to the unavailability of digital resources, skills, and knowledge.
A Comprehensive Framework for Migrating to Zero Trust Architecture
Migrating to Zero Trust Architecture (ZTA) is a strategic approach to strengthen the enterprise’s security postures. The shift to ZTA requires changes across the enterprise which can be challenging to achieve. Utilizing an effective framework for migrating from the old security architecture to ZTA can help ensure smooth transitioning to the Zero Trust journey.