supply chain security
play

Supply Chain Security? SEPTEMBER 20, 2013 JESS SMITH RESEARCH - PowerPoint PPT Presentation

ANNUAL INDUSTRY WORKSHOP NOVEMBER 6-7, 2013 What do you mean, Supply Chain Security? SEPTEMBER 20, 2013 JESS SMITH RESEARCH ENGINEER, PACIFIC NORTHWEST NATIONAL LABORATORY TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG 1


  1. ANNUAL INDUSTRY WORKSHOP NOVEMBER 6-7, 2013 What do you mean, Supply Chain Security? SEPTEMBER 20, 2013 JESS SMITH RESEARCH ENGINEER, PACIFIC NORTHWEST NATIONAL LABORATORY TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG 1 UNIVERSITY OF ILLINOIS | DARTMOUTH COLLEGE | UC DAVIS | WASHINGTON STATE UNIVERSITY FUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T

  2. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G Is Supply Chain Security… Counterfeit detection? Logistics management? Preventing weapons trafficking? Protecting data about supply chains? A box on the auditors forms? Smuggling detection? Risk management? Understanding the sub-contractor tree? Intellectual property protection? Detection of malicious injections? 2

  3. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G A Taxonomy What is Security? What is the Supply Chain? Confidentiality Elements Preventing unauthorized disclosure The product (ICs, hotdogs, iPads) Integrity Processes Accuracy and consistency What we do to elements: transfer, combine, test Availability Accessibility Network The configuration of the processes which are applied on the elements The network is where processes act upon elements. 3

  4. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G A Map Supplier information, contracts, number of Exact action steps Intellectual property Confidentiality available elements in are secret is kept secret the network secret Element is what it Workers trained Correct order of claims to be (no Integrity correctly, machines processing counterfeiting, are calibrated malicious injections) Workers or Disaster management, electricity are Element is available Availability physical security available, when/where needed instructions provided Network Processes Elements 4

  5. ANNUAL INDUSTRY WORKSHOP NOVEMBER 6-7, 2013 QUESTIONS? 6 NOV 2013 JESS SMITH RESEARCH ENGINEER, PNNL JESS TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG 5 UNIVERSITY OF ILLINOIS | DARTMOUTH COLLEGE | UC DAVIS | WASHINGTON STATE UNIVERSITY FUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T

Recommend


More recommend