The Cyber Threatscape Report 2018 released by Accenture, predicts a broadening of cyber attacks against global supply chains as cyber-criminals, espionage and hacktivist groups continue to target supply chains and the strategic business partners for monetary, strategic and political gain.
“Accenture has recognized the rising threat of the supply chain. In fact, this past year has demonstrated that attackers are increasingly going after the organization’s weak spot – their suppliers – as an easier way to get into an organization. While evaluating the security risk emanating from a supplier, it’s important to understand the business and technological relationship between the supplier and the organizations. These relationships will not only define the level of risk, but will also help in understanding how to mitigate risk. For example, a certain third-party provider might process the organizations’ customer data while another third party may be outsourcing to a development firm holding the company’s IP. Both relationships need to be considered separately by the organization so that they can take the necessary steps to mitigate the risk posed by each supplier. For example, in the first case, the organization might be under regulatory requirements such as GDPR for European customer data. In the latter scenario, the company might consider steps such as code review and code sanitation controls to ensure the security of the components.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.