By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SCM Spectrum
  • News
  • Press Releases
  • Case Studies
  • Articles
  • Events
  • Industries
    • 3PL
    • Automotive
    • Chemicals & Energy
    • FMCG
    • E-Commerce / D2C
    • High Tech / Electronics
    • Pharmaceutical / Biotech
    • QuickCommerce / Omnichannel
    • Retail
  • Technology
  • Awards
Reading: Think Rebuild not Recovery after a Supply Chain Cyber Attack
Sign In
Font ResizerAa
SCM SpectrumSCM Spectrum
  • News
  • Press Releases
  • Case Studies
  • Articles
  • Events
  • Industries
  • Technology
  • Awards
Search
  • News
  • Press Releases
  • Case Studies
  • Articles
  • Events
  • Industries
    • 3PL
    • Automotive
    • Chemicals & Energy
    • FMCG
    • E-Commerce / D2C
    • High Tech / Electronics
    • Pharmaceutical / Biotech
    • QuickCommerce / Omnichannel
    • Retail
  • Technology
  • Awards
Follow US
© SCM Spectrum | All Rights Reserved.
SCM Spectrum > Blog > Articles > Think Rebuild not Recovery after a Supply Chain Cyber Attack
Supply Chain Cyber Attack
Articles

Think Rebuild not Recovery after a Supply Chain Cyber Attack

Last updated: October 21, 2024 4:29 pm
By Gajanan 10 Min Read
Share
Supply Chain Cyber Attack
SHARE

Gregg Ogden, Supply Chain Security SME at Immersive Labs, explains how firms can improve resilience and fortify their defences against future threats

Contents
Hi Gregg, tell us a bit about yourself and your roleFor those unfamiliar with Immersive Labs, what are the company’s main activities?Why do organisations need to focus on rebuilding after a supply chain attack, rather than merely recovering?You highlight the British Library rebuild as an example of what organisations should do. Why?What are the key steps involved in rebuilding after a supply chain attack?What tips do you have for organisations looking to build cyber resilience within their supply chains?

Supply chain cyber attacks tend to result in significant resources being poured into recovery – particularly to mitigate its impact. 

While important, this approach has one major limitation, according to Gregg Ogden, Supply Chain Security SME at Immersive Labs.

Here, Gregg tells Supply Chain Digital how businesses can improve resilience and fortify defences against future threats by focusing on ‘rebuild’ rather than ‘recovery’. 

Hi Gregg, tell us a bit about yourself and your role

My role at Immersive Labs is serving as a subject matter expert for Supply Chain Security. My role involves crafting our go-to-market strategies and fine-tuning how we position and highlight the value of our products and services.

Before joining Immersive Labs, I was Head of Customer Support at an aerospace and defence subcontractor. That experience was where I really dug into supply chain challenges and security.

I also worked as a product marketer in the data backup and recovery sector, supporting clients affected by supply chain cyber incidents.

For those unfamiliar with Immersive Labs, what are the company’s main activities?

Immersive Labs is a cybersecurity company headquartered in the UK with offices in Boston, MA. It focuses on people-centric cyber resilience, essentially helping organisations build and prove cyber capabilities across the workforce to defend against threats.

https://youtube.com/watch?v=ZYxcuepiUeg%3Fmodestbranding%3D1%26enablejsapi%3D1%26playsinline%3D1%26rel%3D0

Through our solutions, which include realistic cyber exercises and drills, organisations gain real-time insights into skills and coverage gaps. This lets them continuously measure and upskill their employees and suppliers to prevent and respond to attacks.

Our solutions are for both technical and non-technical teams – these can be cyber teams, developers, engineers, and C-Suite executives. Around 5,000 labs are completed every day.

Our technology has helped more than 400 enterprises and government departments worldwide, including the Ministry of Defence, the NHS, Citi, Pfizer, and HSBC.

Why do organisations need to focus on rebuilding after a supply chain attack, rather than merely recovering?

It’s easy for companies to fall into the trap of focusing solely on a quick recovery after a supply chain attack. Understandably, there’s a desperate urgency to avoid a costly, long-term breach that could harm their brand and partnerships.

However, if businesses only adopt a short-term mindset and skip the rebuilding phase, they risk leaving their fundamental cyber risks unaddressed. This can leave them dangerously vulnerable to similar attacks in the future.

Remember, cyber crime is not a one-off event; attackers often return if they see that security gaps haven’t been closed or vulnerabilities haven’t been fixed. For instance, after the initial exploitation of vulnerabilities in Progress Software’s MOVEit File Transfer software, the Cl0p ransomware group targeted victims a few months later who had not properly addressed these vulnerabilities.

While recovery is crucial to help manage the immediate fallout of a supply chain attack, it rarely addresses the root cause of the breach. Take the British Library, for instance—its made significant strides in improving their cyber posture since their October 2023 attack. To truly enhance an organisation’s defences, it’s crucial to focus on rebuilding and improving cyber resilience so that the same mistakes are not repeated.

You highlight the British Library rebuild as an example of what organisations should do. Why?

In this instance, the British Library thoroughly reviewed their systems, identified the root cause of the breach, and, most importantly, committed to modernising and securing their infrastructure. 

It went beyond just fixing the immediate vulnerability by implementing robust cybersecurity measures like multi-factor authentication (MFA), air-gapped backups and threat detection, and enhanced their incident response capabilities and disaster recovery protocols.

Rather than merely patching the vulnerability and moving on, the British Library opted for a comprehensive overhaul of their security systems. Their response to the cyber attack offers valuable lessons for organisations of all sizes:

  • Beyond patching: Instead of simply addressing the immediate vulnerability, the Library adopted a proactive approach by strengthening its entire security infrastructure.
  • Comprehensive overhaul: A holistic approach to cybersecurity is essential. By improving its overall cyber posture, the Library reduced its vulnerability to future attacks.
  • Learn from incidents: Organisations should also recognise that cyber attacks can be seen as opportunities for growth and improvement. By analysing the incident and taking corrective measures, organisations can become more resilient.
  • Invest in prevention: Proactive measures, such as regular security audits and employee training, can help prevent future breaches.

In essence, the British Library’s experience demonstrates the importance of a proactive and comprehensive approach to cybersecurity. Organisations can better protect themselves by investing in prevention, preparedness, and resilience.

Companies should focus on rebuilding instead of recovery after cyber attacks, says Immersive Labs. Picture: DC Studio via Freepik

What are the key steps involved in rebuilding after a supply chain attack?

Rebuilding after a supply chain attack can seem like a mammoth task, but it can be significantly easier by breaking it into three key steps:

  1. Crisis post-mortem: Carrying out a thorough review after a crisis is essential for identifying gaps in security measures and response strategies. This analysis should detail how and where the attack occurred, assess the effectiveness of existing security measures, and evaluate the incident response. It’s crucial that this review is not seen as a blame game but as an opportunity for improvement.
  2. Implementing monitoring and exercising: Following the review, organisations should review existing tools and implement additional robust defences to identify vulnerabilities and prevent future attacks. This includes measures that provide IT teams with real-time visibility into supply chain activities and detect suspicious activity.
    Additionally, addressing the human element is essential. Regular, scenario-driven exercising and training should be conducted to cover the latest threats, handling of sensitive data, and adherence to security protocols. Such programmes upskill employees so they are prepared to respond to cyber threats effectively.
  3. Getting systems back in action: Reconnecting systems and resuming normal operations should be a gradual process that balances business needs while prioritising security. During this phase, it is essential to verify the integrity of restored systems and data and conduct audits to ensure that all vulnerabilities have been fully addressed.

What tips do you have for organisations looking to build cyber resilience within their supply chains?

As previously mentioned, improving cyber resilience involves not just strengthening security measures but also cultivating a culture of cybersecurity awareness among employees.

Basic cyber hygiene measures are essential for protecting your organisation’s security. This includes enforcing multi-factor authentication (MFA) across the entire network, updating and patching software promptly, and conducting regular security audits and penetration testing.

To ensure that your suppliers are also maintaining high security standards, it’s crucial to establish clear guidelines and expectations. The lead supplier or OEM should set the network parameters and guidelines for their suppliers to follow, and then verify compliance through regular assessments and audits. This collaborative approach helps to strengthen the overall security posture of the entire supply chain.

Beyond these basics, organisations should adopt advanced security controls such as threat monitoring and network segmentation. These measures help IT teams to quickly detect malicious activity, prevent attacks from spreading across the supply chain, and address issues promptly.

Training should move beyond traditional presentation or paper-based methods. Instead, it should include simulated exercises that replicate real-world cyber attack scenarios. This approach not only keeps employees engaged but also helps them develop the skills needed to respond effectively under pressure.

Moreover, employees need to be trained on response protocols. Clear guidelines on communication channels, procedures, and recovery plans are essential for a coordinated and effective response during an attack.

Ultimately, improving cyber resilience is crucial when rebuilding after a supply chain attack. By implementing these practices, businesses can bolster their cyber posture and better withstand future threats.

Read More

You Might Also Like

Kinaxis Supercharges BayWa r.e. Solar Trade’s Supply Chain with AI-Powered Orchestration

JustDeliveries Secures ₹5.5 Crore to Expand Tech-Driven Cold Chain Logistics Across India

DHL Expands Agra Service Center to Boost Export Efficiency and MSME Growth

DPIIT and Häfele India Partner to Boost Local Manufacturing, Innovation and Startup Ecosystem

TrucksUp and IndianOil Launch XTRAPOWER-Fleet Card to Revolutionize Fuel and Fleet Management

TAGGED:Logisticssupply chainSupply Chain Cyber AttackSupply Chain Managementwarehousewarehouse management
Share This Article
Facebook Twitter Email Copy Link Print
SCM SPECTRUM - Uber Courier XL delivery service for large goods in India.
3PLIndustriesNewsTechnology

Uber Expands Logistics Services with Courier XL for Large Goods Delivery

Uber has rolled out a new service in India called Courier XL,…

By Meenakshi SR 5 Min Read
SCM SPECTRUM - BayWa r.e. and Kinaxis collaborate to enhance solar supply chain with AI
IndustriesNewsPress ReleasesTechnology

Kinaxis Supercharges BayWa r.e. Solar Trade’s Supply Chain with AI-Powered Orchestration

Kinaxis® (TSX:KXS), a global leader in end-to-end supply chain orchestration, announced that BayWa…

By Meenakshi SR 3 Min Read
SCM SPECTRUM - Suez Canal Authority officials meeting with global shipping executives
3PLIndustriesNewsTechnology

Suez Canal Authority Engages Global Shipping Giants Amid Improved Red Sea Security

The Suez Canal Authority (SCA) has intensified its efforts to revive dwindling…

By Meenakshi SR 4 Min Read

More Popular from SCM Spectrum

The Indian Navy signs an MoU with Gati Shakti Vishwavidyalaya to improve logistics capabilities and education in supply chain management.
3PLIndustriesPress Releases

Gati Shakti Vishwavidyalaya and Indian Navy sign MoU for Logistics related Education, Research and Training

By Meenakshi SR 3 Min Read
SCM Spectrum - A fleet of GreenLine LNG-powered trucks parked at a logistics hub, promoting sustainable transportation in India.
3PLAutomotiveIndustriesNews

GreenLine Becomes India’s Leading Sustainable Logistics Partner with LNG-Powered Trucks

By Meenakshi SR 4 Min Read
IKEA warehouse with products ready for shipping amidst trade challenges
NewsRetail

IKEA’s Strategy for Potential Tariffs: How the Furniture Giant Prepares for Trade Barriers

By Avinash 3 Min Read
Show More
SCM Spectrum

SCM Spectrum, the hub for supply chain management excellence. Our platform is dedicated to providing an all-encompassing array of information, insights, and resources, meticulously curated to navigate the multifaceted landscape of supply chain operations.

Categories

  • News
  • Press Releases
  • Product Launches
  • Blogs
  • Case Studies
  • Awards
  • Articles
  • Industries
    • 3PL
    • E-Commerce / D2C
    • Automotive
    • Chemicals & Energy
    • Pharmaceutical / Biotech
  • Technology
  • Interview

Quick Links

  • About
  • Contact Us
  • Advertise with us
  • Privacy Policy
  • Terms & Conditions

SCM Spectrum  |  All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?