logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Fundamentals of Cybersecurity Supply Chain Risk Management (C-SCRM)

SS Course: 2001667

Course Overview

TOP

This two-day course consists not only of training in understanding Cybersecurity Supply Chain Risk Management (C-SCRM), but also provides guidance in preparing organizations to deal with the myriad of risks that come from the supply chain.

                                                                  

Scheduled Classes

TOP

What You'll Learn

TOP

You will learn the basics of C-SCRM and then dive deeply into NIST C-SCRM guidance, integration into enterprise risk management, success factors, controls, and implementing effective C-SCRM through the lens of several realistic scenarios. Also included is a primer, linked to free templates, on creating your own C-SCRM program.

Outline

TOP
Viewing outline for:

Course Introduction

The Basics of Cybersecurity Supply Chain Risk Management

  • What is C-SCRM
  • ICT, IT, OT, and Enterprise vs Organization
  • The Dimensions of SCRM
  • Describing the Supply Chain of an Enterprise
  • Internal C-SCRM Stakeholders

An Overview of NIST SP 800-161r1

  • Name and Purpose
  • Relationship to other NIST Publications
    • Cybersecurity Framework (NIST CSF)
    • Describing the NIST 800 Special Publication Series
    • SP 800-37, Revision 2: The NIST Risk Management Framework (RMF)
    • SP 800-39, Managing Information Security Risk: Organization, Mission, and
    • Information System View
    • SP 800-53, Revision 5: Security and Privacy Controls for Information Systems and Organizations
    • SP 800-53B Control Baselines for Information Systems and Organizations
    • SP 800-181, Revision 1, National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework
  • Design of the Publication

Integration of C- SCRM into Enterprise Risk Management

  • The Enterprise Risk Management Process
  • The Business Case for C-SCRM
  • Cybersecurity Risks Throughout Supply Chains
  • Multilevel Risk Management
    • Defining Roles and Responsibilities
    • Level 1 – Enterprise
    • Level 2 – Mission and Business Process
    • Level 3 – Operational
  • C-SCRM Program Management Office (PMO)

Critical Success Factors in C-SCRM

  • C-SCRM in Acquisition
  • Supply Chain Information Sharing
  • C-SCRM Training and Awareness
  • C-SCRM Key Practices
  • Capability Implementation Measurement and C-SCRM Measures
  • Dedicated Resources

C-SCRM Security Controls

  • Introduction and Background
  • Controls Design
  • C-SCRM Controls Throughout the Enterprise
    • Applying C-SCRM Controls to Acquiring
    • Considerations for Suppliers
    • Considerations for Developers and Manufacturers
    • Considerations for System Integrators
    • Considerations for External System Service Providers of Information System Services
    • Considerations for Other ICT/OT-Related Service Providers
  • Selecting, Tailoring, And Implementing C-SCRM Security Controls
  • C-SCRM Control Family Summaries

The Risk Exposure Framework

  • Threat Scenario Description and Use Cases
  • Risk Exposure Framework
    • Step 1: Create a Plan for Developing and Analyzing Threat Scenarios
    • Step 2: Characterize the Environment
    • Step 3: Develop and Select Threat Events for Analysis
    • Step 4: Conduct an Analysis Using the Risk Exposure Framework
    • Step 5: Determine C-SCRM Applicable Controls
    • Step 6: Evaluate/Feedback
  • Risk Exposure Framework Example
  • Risk Exposure Framework Scenarios
    • Scenario 1: Influence or Control by Foreign Governments Over Suppliers
    • Scenario 2: Telecommunications Counterfeits
    • Scenario 3: Industrial Espionage
    • Scenario 4: Malicious Code Insertion
    • Scenario 5: Unintentional Compromise
    • Scenario 6: Vulnerable Reused Components Within Systems

Prerequisites

TOP

Basic computer knowledge and an interest in creating or improving Cybersecurity Supply Chain Risk Management (C-SCRM) in an organization.

    Who Should Attend

    TOP

    The Cybersecurity Supply Chain Risk Management (C-SCRM) course is appropriate for anyone who deals with risk, security, or technology related to the supply chain in an organization. This includes business, security, and IT professionals or anyone else who is a stakeholder in Cybersecurity Supply Chain Risk Management (C-SCRM). This course is specifically for those who have responsibility for or interest in C-SCRM.

    Next Step Courses

    TOP