Supply Chain Security In Critical Infrastructure Systems

By Manish Tiwari , Suchit Mishra , Faruk Kazi , Cristofaro Mune on 07 Mar 2020 @ Nullcon
📹 Video 🔗 Link
#supply-chain-attack #supply-chain-security #critical-infrastructure #cybersecurity-framework #risk-management #third-party-risk-management
Focus Areas: ⚖️ Governance, Risk & Compliance , 📦 Software Supply Chain Security , 🏭 Industrial Control Systems Security

Presentation Material

AI Generated Summary

The talk addressed security risks within the supply chains of critical infrastructure sectors, such as energy, telecommunications, and manufacturing. The core research focused on the extended lifecycle of these systems—often 20 to 30 years—and the associated vulnerabilities from component contamination and dependency on multiple vendors.

Key findings highlighted the significant challenge of managing security across heterogeneous technology stacks and legacy systems. A major point was the lack of universally adopted, robust standards for supply chain integrity, particularly for hardware and software components. The speaker contrasted the reliability-focused view of supply chains with a security-focused one, noting that traditional contingency planning is insufficient against deliberate, long-term contamination. The discussion included the complexity of IT/OT convergence and the difficulty of ensuring provenance and authenticity across global, multi-tiered supply networks.

Practical implications stressed the necessity for organizations to implement comprehensive supply chain risk management frameworks. This includes rigorous vendor assessment, product compliance testing against recognized standards (e.g., ISI), and continuous monitoring throughout the system’s operational life. The talk concluded that for critical infrastructure, security must be integrated from initial design through to decommissioning, requiring coordinated policy and industry action to address systemic vulnerabilities arising from prolonged dependency on potentially compromised components.

Disclaimer: This summary was auto-generated from the video transcript using AI and may contain inaccuracies. It is intended as a quick overview — always refer to the original talk for authoritative content. Learn more about our AI experiments.