Supply Chain Threats

Supply Chain Risk Management

 

20200925 Supply Chain article

 

 

NCSC works with its partners to assess and mitigate the activities of foreign intelligence entities and other adversaries who attempt to compromise the supply chains of our government and industry. These adversaries exploit supply chain vulnerabilities to steal America’s intellectual property, corrupt our software, surveil our critical infrastructure, and carry out other malicious activities. They infiltrate trusted suppliers and vendors to target equipment, systems, and information used every day by the government, businesses, and individuals. The cost to our nation comes not only in lost innovation, jobs, and economic advantage, but also in reduced U.S. military strength.

 

 

RELEVANT REPORTS, BRIEFINGS & READING MATERIAL

 

(New) Supply Chain Risk Management: Reducing Threats to Key U.S. Supply Chains

 

Supply Chain – Are you at Risk?

 

Supply Chain Risk Management (SCRM) – Don’t Be the Weakest

      Link!

 

Thought Leaders: Supply Chain Security

 

 

5G Wireless Technology

 

Supply Chain Risk Management – Authorities, Policies, and

      Standards

  • SECURE Technology Act: Establishment of the Federal Acquisition Security Council

          -  Federal Acquisition Security Council overview (PDF)

          -  Federal Acquisition Supply Chain Security Act graphic (PDF)

          -  H.R.7327 SECURE Technology Act (PDF)

 

 

 Tools

 

Supply Chain Resources

 

Additional Resources

National Counterintelligence and Security Center