Managing Cyber Risks in the Supply Chain Training Course
This instructor-led, live training (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
- The time and cost of cyber risk management vs the time and cost from a disruption to the supply chain.
Key Cyber Supply Chain Risks
- In-house software and hardware vulnerabilities
- Third party hardware and software vulnerabilities
- In-house security knowledge and practices
- Third-party security knowledge and practices
Supply Chain Cyber Risk Case Study
- Risk exposure through third-party software
Tools and Techniques for Attacking a Supply Chain
- Malware
- Ransomware
- Adware
Supply Chain Cyber Risk Case Study
- Outsourcing to an external website builder
Cyber Supply Chain Security Principles
- Assume your system will be breached.
- Cybersecurity as a technology + people + process + knowledge problem.
- Physical vs cybersecurity
Supply Chain Cyber Risk Case Study
- Outsourcing data storage to a third-party provider
Assessing Your Organization's Risk Level
- Hardware and software design processes
- Mitigation of known vulnerabilities
- Knowledge of emerging vulnerabilities
- Monitoring of production systems and processes
Supply Chain Cyber Risk Case Study
- Cyber attacks by internal members of the team
Internal Security Threats
- Disgruntled employees and not so-disgruntled employees
- Access to login credentials
- Access IoT devices
Forming Collaborative Partnerships
- Proactive vs punitive approach to vendor risk
- Achieving a common objective
- Fostering growth
- Mitigating risks
A Model for Implementing Supply Chain Cyber Security
- Vetting suppliers
- Establishing control
- Continuous monitoring and improvement
- Training and education
- Implementing multiple layers of protection
- Creating a cyber-crisis team
Summary and Conclusion
Requirements
- Experience with supply chains
Audience
- Supply chain managers and stakeholders
Open Training Courses require 5+ participants.
Managing Cyber Risks in the Supply Chain Training Course - Booking
Managing Cyber Risks in the Supply Chain Training Course - Enquiry
Managing Cyber Risks in the Supply Chain - Consultancy Enquiry
Consultancy Enquiry
Testimonials (2)
I liked the approach of the teacher from the very beginning. The fact that he/she tailored the teaching to our needs, and when we encountered problems, he helped us with great interest.
flavia - ASOCIATIA PENTRU VIITORII PROFESIONISTI IN TEHNOLOGIA INFORMATIEI
Course - SAP Financial Accounting and Controlling (FICO) for Consultants
I found NobleProg very easy to work with, considering the timezone challenges and our difficulty with trainees requiring support in Japanese. Overall, working with you on this training was satisfactory and I would have no hesitation recommending your organisation. If a training need occurs for us in the ASPAC region again, I will be in touch with NobleProg.
Siobhan Bowe - Glanbia Nutritionals
Course - SAP Sales Order Processing and Supply Chain Management
Upcoming Courses
Related Courses
Advanced Sales and Operations Planning (S&OP) for Demand Forecasting
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at intermediate-level to advanced-level supply chain professionals who wish to improve demand forecasting accuracy and optimize S&OP processes.
By the end of this training, participants will be able to:
- Enhance statistical forecast accuracy and reduce demand variability.
- Implement best practices in S&OP for perishable and non-perishable products.
- Utilize advanced forecasting techniques and data analytics for demand planning.
- Optimize cross-functional collaboration between sales, operations, and supply chain teams.
- Leverage digital tools for better S&OP decision-making.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
Certified Supply Chain Professional (CSCP) Preparation
35 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at intermediate-level supply chain professionals who wish to have a comprehensive training to prepare for the Certified Supply Chain Professional (CSCP) exam.
By the end of this training, participants will be able to:
- Gain an in-depth understanding of all key areas of supply chain management, from demand forecasting to logistics and distribution.
- Prepare for the Certified Supply Chain Professional (CSCP) exam through targeted study materials, practice exams, and review sessions.
- Apply supply chain management principles and best practices in real-world scenarios, improving operational efficiency and effectiveness.
- Learn how to identify, assess, and mitigate supply chain risks to ensure business continuity and resilience.
- Manage global supply chains, including navigating international logistics, regulatory challenges, and cultural differences.
Data Breach Management
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Microsip SCM: Supply Chain Management with Microsip ERP
21 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at beginner-level to intermediate-level supply chain managers and ERP administrators who wish to learn how to use Microsip SCM to manage and improve their supply chain processes and performance.
By the end of this training, participants will be able to:
- Understand the core concepts and benefits of Microsip SCM and its integration with Microsip ERP.
- Plan, execute, and control their supply chain processes using Microsip SCM.
- Monitor and analyze their supply chain performance and identify improvement opportunities.
- Collaborate and communicate with their suppliers, customers, and partners.
Business Continuity Management
35 HoursDescription:
This is a 'Practitioner' course and leans heavily on practical exercises designed to reinforce the concepts being taught and to build the delegates' confidence in implementing business continuity management. The course is also designed to encourage debate, and the sharing of knowledge and experience between students.
Delegates will benefit from the practical and extensive experiences of ours trainers who are practicing business continuity management and ISO 22301:2019 specialists.
Delegates will learn how to:
- Explain the need for business continuity management (BCM) in all organisations
- Define the business continuity lifecycle
- Conducting business continuity programme management
- Understand their organisation sufficiently to identify mission-critical impact areas
- Determine their organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain and review plans
- Embed business continuity in an organisation
- Define terms and definitions appropriate to business continuity
By the end of the course, delegates will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
SAP Digital Supply Chain
21 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at managers who wish to streamline an organization's supply chain (inter-departmental and with customers, suppliers, contract manufacturers, logistics service providers, and other partners).
SAP Financial Accounting and Controlling (FICO) for Consultants
28 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at SAP power users who wish to learn the consulting skills to implement and configure SAP FICO within an organization.
By the end of this training, participants will be able to:
- Install SAP FICO and related sub-modules.
- Gather business requirements and define an organization's structure.
- Configure SAP FI and CO modules to manage the financial transactions within an organization.
- Improve an organization's processes and uncover opportunities for optimizing workflow and reducing costs.
SAP Sales Order Processing and Supply Chain Management
14 HoursThis instructor-led, live training (online or onsite) is aimed at end users with no previous SAP experience and focuses on understanding and operating SAP's Sales Order Processing and Supply Chain Management modules.
By the end of this training, participants will be able to:
- Understand the concepts behind two of SAP's most popular modules: Sales Order Processing and Supply Chain Management.
- Use SAP to unify and streamline the Sales Order Process.
- Understand and apply SAP's Supply Chain Management module to logistic operations within an organization.
- Generate and export reports that can be used to gain valuable insights into a company's operations.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Supply Chain Management in China
14 HoursSCM (Supply Chain Management) refers to the control of activities involved in taking goods and materials from supplier to consumer.
In this instructor-led, live training, participants will learn the fundamentals of SCM as they apply to the China market. This training is aimed at managers who wish to enter the Chinese market. It includes a series of discussions, case studies and exercises to help participants prepare for real-world implementation and practice.
By the end of this training, participants will be able to:
- Understand the dynamics of SCM in China vs SCM in other countries
- Take advantage of China-specific innovations in the supply chain to develop an SCM strategy
- Implement an integrated end-to-end approach to SCM
- Negotiate on price with local suppliers
- Identify key global sourcers and other players in the China supply chain
- Conduct a detailed analysis of common business sourcing problems in China
Audience
- Sourcing Managers
- Persons involved in the SCM process
Format of the course
- Part lecture, part discussion, exercises and hands-on practice
Snyk
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Supply Quality Management
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at supply managers and personnel who wish to adopt a quality-centric approach to managing suppliers.
By the end of this training, participants will be able to:
- Adopt a proactive and collaborative approach for enhancing supplier quality.
- Clearly define and communicate supply specifications and requirements.
- Explore different Supplier Quality Management Systems (QMS) and apply an analytical approach to choose the most suitable one.
- Use a QMS system to continuously monitor, inspect and audit supply chains.
- Ensure that suppliers provide the highest quality products and services.
Tenders Initiation
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at beginner-level professionals who wish to understand and master the principles of public procurement, identify relevant opportunities, and prepare optimized responses to calls for tenders.
By the end of this training, participants will be able to:
- Understand and master the key principles of public procurement.
- Identify relevant opportunities and decipher administrative, technical, and financial clauses.
- Compose and submit complete, optimized responses that meet public purchasers' expectations.
Understanding Modern Information Communication Technology
7 HoursThis course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks against cryptosystems and some recent related vulnerabilities will be referrenced