Skip to content
Critical Infrastructure

Closing the Cyber Gap in Manufacturing Supply Chains


Course
Upgrade subscription below
Contact us

Gabriela Ciocarlie, Patrick Dunphy, Michael Spaulding, Zefren Edior and Albert Rooyakkers explore supply chain defense priorities, digital twin applications and business continuity frameworks for supplier breach scenarios.

Supply chain vulnerabilities doubled from 15% to 30% in recent reports as nation-state adversaries target single B2B service providers to access millions of records. The CrowdStrike incident renewed focus on concentration risk and unexpected downtime planning, but organizations struggle to extend IT-focused third-party risk programs into manufacturing supply chains.

Manufacturing supply chain risk differs fundamentally from IT vendor assessment. Raw material suppliers cannot complete 300-question security questionnaires, yet breaches at third-party logistics partners force costly replanning across entire operations.

The session will explore:

  • Why supply chain defense prioritizes help desk authentication and network segmentation over stopping nation-state actors;
  • Digital twin applications that validate attack scenarios before production deployment;
  • Business continuity frameworks that plan for supplier breach downtime rather than prevention alone.

 

Here is the course outline:

The Weakest Link: Closing the Cyber Gap in Manufacturing Supply Chains

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button