From the course: Cyber Supply Chain Risk Management: Designing, Deploying, and Maintaining Secure Supply Chain Programs

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Conducting risk assessments, part 1

Conducting risk assessments, part 1

- [Instructor] Now that we covered the first two steps of CSRM program, let us dive into the third and fourth steps needed for building the program. Step three, assess phase. Once the supplier's inventory is available, it is essential to identify your critical suppliers and services. Assessing the supplier's criteria include supplier access to your organization, intellectual property, and time to restore in case of a disruption, C-SCRM risk assessments follow the same processes performed for cybersecurity assessments. The C-SCRM team usually leads the risk assessments before acquiring or agreeing to a contract with a supplier. As per NIST, the following are the components of supply chain risk assessments. Number one, information gathering and scoping analysis. This is covered as part of the identify phase in the earlier video. Number two, threat analysis and vulnerability analysis. This is covered as part of understanding the supply chain risks, understanding your environment videos…

Contents