Wednesday, September 17, 2025
In the recent roundtable discussion "Forging Practical Solutions to Threats Targeting our Digital Infrastructure," experts from various sectors came together to address the critical issues surrounding Cybersecurity Supply Chain Risk Management (C-SCRM).

The conversation delved into how agencies can establish effective C-SCRM programs, the emerging threats they need to tackle, the role of automation, and the standards or KPIs that can help assess progress and ensure high ROI.

Below is a short summary of key highlights from the session, hosted by our Center in collaboration with the National Academy of Public Administration. We will soon publish a full report reflecting on these points and making recommendations for future steps by Robert Handfield, Executive Director of Supply Chain Resource Cooperative and Bank of America University Distinguished Professor of Operations and Supply Chain Management at North Carolina State University.

Establishing Effective Cybersecurity Supply Chain Risk Management Programs

Agencies should adopt a comprehensive approach to C-SCRM that spans the entire lifecycle of cybersecurity measures. Leadership support and buy-in are crucial for successful implementation. Competing priorities often hinder the prioritization of cybersecurity agendas within agencies. Shared services and public-private partnerships can offer more robust solutions than individual agency efforts, as they provide real-time information and resources that might be beyond the reach of smaller agencies.

Potential Action Items:

  • Develop clear federal objectives to ensure consistent implementation across agencies.
  • Encourage vendors to adopt better practices by offering contract incentives for enhanced cybersecurity measures.
  • Foster collaboration and data sharing among agencies to leverage collective knowledge and resources.

Addressing Emerging Threats and Attack Vectors

The landscape of cybersecurity threats is constantly evolving, with new attack vectors emerging regularly. Social engineering attacks, such as phishing, remain prevalent and require basic cybersecurity fundamentals from all suppliers. The integration of AI and advanced analytics can help map out supply chains and identify vulnerabilities before they can be exploited. Continuous improvement and proactive vendor reviews are essential to maintain a resilient cybersecurity posture.  AI can play an important role in creating additional layers of security in an evolving cyberthreat environment, enabling government to reduce vulnerabilities and stay ahead of hackers as they become more sophisticated in their attacks.

Potential Action Items:

  • Implement regular training and awareness programs to mitigate the risk of social engineering attacks.
  • Utilize AI and advanced analytics such as anomaly detection, behavioral analysis, and malware detection, to continuously monitor and assess supply chain vulnerabilities.
  • Establish a proactive contract review process, and ensure that multiple suppliers are available as backups.

Role of Automation in Streamlining C-SCRM Processes

Automation can significantly enhance the efficiency of C-SCRM processes, by reducing the manual burden on analysts and enabling continuous diagnostics. AI-powered tools can assist in vulnerability assessments, remediation, and mitigation, reducing the number of people required to manage dashboards. However, automation relies on accurate and clean data. Also, agencies must invest in training and preparation to ensure that technical personnel can effectively manage automation, to leverage AI capabilities as well as communicate risks.

Action Items:

  • Invest in AI training programs to equip technical personnel with skills to manage automated systems.
  • Ensure data quality by implementing rigorous data cleaning and validation processes, as well as content filtering and tracing of data intrusions.
  • Develop AI-powered tools that can autonomously identify and remediate vulnerabilities in real-time.

Standards and KPIs for Assessing C-SCRM Progress

To measure the success of C-SCRM programs, agencies need to establish clear standards and key performance indicators (KPIs). Critical metrics can help agencies to assess the speed of recovery from cyber disruptions, the effectiveness of vendor reviews, and the continuous improvement of cybersecurity measures. Agencies should strive for a balance between cost, benefit, and risk measures, and adopt a decision framework that enables agile responses to subpar performance and emerging threats. Regular updates to contract incentives, as well as continuous monitoring of cyber performance for supply chain systems, can help maintain a high level of cybersecurity readiness.

Action Items:

  • Define clear KPIs that measure the speed and effectiveness of recovery from cyber disruptions, including mean time between failure and incident response time.
  • Regularly update contractual terms to reflect the latest cybersecurity standards, working with software providers to introduce practices that have been proven as effective.
  • Implement continuous monitoring systems to ensure ongoing compliance and readiness, sucn as context-aware logging and filtering of suspicious inputs.

The roundtable highlighted the importance of a holistic approach to C-SCRM, the need to address emerging threats proactively, the role of automation in streamlining processes, and the establishment of robust standards and KPIs. By focusing on these themes, agencies can enhance their cybersecurity posture and achieve high ROI in their C-SCRM programs.