Skip to main content Skip to Footer

LATEST THINKING


Chief supply chain officers: Do you know where your weakest link is?

Cyber attackers are targeting your smaller partners to get to you.

Overview

With 85 percent of organizations reporting they have already adopted supply chain digital capabilities or will do so in the next year, cyber risk is at an all-time high.

With a single breach, attackers can potentially access not just one company’s sensitive information, but multiple companies’ data and more. At worst, they can disrupt service with cyber vandalism, causing companies exponential costs and reputation damage.

The digital links between companies now connect the entire ecosystem in a cyber risk chain. Yet only 11 percent of chief supply chain officers are taking charge in this area.

DOWNLOAD THE FULL REPORT [PDF]

Key Findings

More than 60 percent of cyberattacks stem from the supply chain. And 70 percent of companies have already experienced a cyberattack.

Not surprisingly, in half of the companies we surveyed, there was no alignment between supply chain and cybersecurity operations.

Technology advances will continue to wreak havoc with supply chain security, even as they improve business operations. As the Internet of Things (IoT) and 3D printing become part of the everyday fabric of manufacturing and supply chain operations, cybersecurity issues take center stage. 3D printing of patented designs occurs through code and file sharing between devices, meaning intellectual property will be scattered throughout a supply chain. Security must exist in all of those same places and every nook and cranny in between.

Even if your team adequately fortifies your firm’s virtual walls, it is not enough. Assume you have a weak link outside those walls.

Recommendations

Operationalize a cyber-attack-resilient supply chain

The first step is to identify any weak links through a thorough security audit of your partners.

Second, make your supply chain security model business driven. Strategic governance should be the purview of chief supply chain officers, as they are responsible for the bottom line in this area.

Third, align supply chain risk management strategy with cybersecurity strategy, internally and externally.

And last, operationalize a cyber-attack-resilient supply chain. Find ways to detect immediately, respond rapidly and recover as soon as possible to prevent disruption of service.

Learn more about Accenture Strategy


Authors

Manish Chandra

Manish Chandra

Managing Director – Accenture Strategy,
Operations Strategy

Mail to Manish Chandra. This opens a new window.   Connect with Manish Chandra's Profile on LinkedIn. This opens a new window.

Kevin Richards

Kevin Richards

Managing Director – Accenture Strategy, Security

Mail to Kevin Richards. This opens a new window.   Connect with Kevin Richards' Profile on LinkedIn. This opens a new window.

Kris Timmermans

Kris Timmermans

Senior Managing Director – Accenture Strategy,
Operations Strategy

Mail to Kris Timmermans. This opens a new window.   Connect with Kris Timmermans' Profile on LinkedIn. This opens a new window.   Follow Kris Timmermans on Twitter. This opens a new window.

VIEW PROFILE

SUGGESTED CONTENT

Stay In The Know

Receive e-mails from Accenture featuring new content that matches your interests.

Visit the subscription center to make your selections and subscribe to New from Accenture.