70 likes | 126 Views
Threats. Top Threats. Top Attack Types. China. Supply Chain Attacks. Email Attacks. Network Attacks. Spam & Phish. Russia. North Korea. Email Defenses. Supplier Mgt. Network Defenses. Criminals. Employees. Applications. Sensitive Data. Iran.
E N D
Threats Top Threats Top Attack Types China Supply Chain Attacks Email Attacks Network Attacks Spam & Phish Russia North Korea Email Defenses Supplier Mgt Network Defenses Criminals Employees Applications Sensitive Data Iran Attacks are increasingly focused on Supply Chain
China’s Long-Term Economic Plan “Made in China 2025” Initiative • Agriculture • Aviation and aerospace • Biotechnology and advanced medical equipment • Electrical power • High-end robotics • Information technology • Maritime engineering • New energy automotive technology • Innovation • Whole of government • Green growth • Diversification • Shared prosperity • New materials and composites • Rail transportation
World’s Largest Companies, 2004-2016 Nationality of World’s 10 Largest Companies (according to annual Forbes Global 2000 List)
Government Cyber and Information Security Reform Efforts • CUI-Controlled Unclassified Information established by E.O. 13356. Defines safeguarding and promotes authorized information sharing. Applied to industry through DFARS 252.204.-7012; FAR 52.204-21 and FAR 2017-016 • FAR 52.204-21-Stregnthens Contract Language • FAR 2017-016-Adding CUI Requirements • DFARS 252.204-7012-Safeguarding Covered Defense Information and Cyber Incident Reporting • NIST SP 800-171-Annual compliance of the Tier 1-4 Supply Chain • Delivering Uncompromised –Adding Security to the Acquisition Process • Cybersecurity Maturity Model Certification (CMMC)
Overall Private Industry Concerns • Lack of uniform approach across the government drives costs and impairs effective compliance • CMMC implementation will need to be carefully managed to prevent supplier disruption. • Block contract changes without additional funding. • Additional burden on smaller companies to comply Primes held liable for cyber-related issues at subs. • Lack of clarity in standards, or which level applies, could lead to disputes with DoD, subs, or other suppliers. • Cyber sensors implicate wiretap and privacy laws.