Affiliation:
1. Delta Risk LLC, Arlington, VA, USA
2. Director of Application Development and Risk Management, Anshinsoft Inc., New York, NY, USA
Abstract
Information technology (IT) supply chains are subject to security risks even during the most stable of economic times, However, when economies come under stress due to brisk growth or rapid contraction, IT supply chains become greater targets for nefarious players, be they employees, hackers, terrorists or nation states, for a variety of reasons. Maintaining both cyber and physical security of owned systems and facilities, over which you have direct control, is difficult and expensive enough under normal conditions. However, attempting to preserve adequate levels of security over third parties, be they process outsourcers, product vendors or contractors, is much more challenging and can be extremely costly in time, money and resources. It is also fraught with organizational, social, economic, political, geographical and contractual challenges. In this paper, the authors list a broad range of potential IT-related security risks and suggest how they might become exacerbated during times of economic stress. Mitigation of these risks may call for extreme measures. Some actions are reasonable and straightforward to implement, whereas others require substantial effort and indeed may not be achievable under current legal and regulatory conditions. The authors offer recommendations for overcoming manageable hurdles, and suggest how some reduction in risk might be attained even in situations where ready solutions are not yet available.
Subject
Information Systems and Management,Computer Networks and Communications,Hardware and Architecture,Safety Research,Safety, Risk, Reliability and Quality,Software
Reference33 articles.
1. Axelrod, C. W. (2008a). Security and change (pt. 1). Blackouts, April 7, 2008. Retrieved from www.bloginfosec.com
2. Axelrod, C. W. (2008b). Security and change (pt. 2). Black Swans, April 14, 2008. Retrieved from www.bloginfosec.com
3. Axelrod, C. W. (2008c). Security and change (pt. 3). White Knights, April 21, 2008. Retrieved from www.bloginfosec.com
4. Axelrod, C. W. (2008d). IT and Infosec insourcing—Could you do it if you wanted? July 3, 2008. Retrieved from www.bloginfosec.com
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献