Supply chain 2013: Stop playing whack-a-mole with security threats

As supply chain threats grow ever more sophisticated, companies tap new technologies to protect their assets and deliver the goods.

global supply chain icon

IT leaders can be excused for feeling like their supply chains are one link away from disintegration these days. The news over the past few months has been alarming, from outcries over horsemeat in Europe and mislabeled fish in New York to the longer-term impacts on supply chains from environmental events like the tsunami in Japan, monsoons in Thailand and the volcano in Iceland.

And those are just the highly publicized issues. Increasingly, CIOs are challenged to protect their supply chain from physical and cybertheft, counterfeiting, potential scarcity of materials and regulatory mandates such as removing lead from materials. Welcome to Whack-a-Mole, supply chain-style, where you attack one problem, only to have another pop up elsewhere.

Experts say the problem is only going to get worse. "Globalization lengthens supply chains and increases complexity," says Emma Scott, spokesperson for the Chartered Institute of Procurement and Supply (CIPS) in London, the professional organization of procurement professionals. "When supply chains are leaner, any disruption affects you more" -- and, thanks to a decade or more of globalization and cost-cutting, supply chains these days are very lean.

This makes the issue of visibility into the supply chain -- or the lack of same -- that much more critical, says Matt Smith, founder and chief strategy officer of Icix, a cloud-based exchange for supply chain partners based in South San Francisco, Calif. "Companies have visibility into purchasing and logistics, but not into where materials or ingredients or components are actually grown or manufactured. When you lose visibility, you get horsemeat in meatballs, e coli in spinach, lead in toys and worse."

Then there's velocity to consider. "You have to move information faster to enable the supply chain to react to changes. Velocity allows us to plan more aggressively. That's what wakes me up in the morning," says Nathan Johnson, CIO of Ports America, which manages 42 ports around the United States. One of his big concerns: spikes in transport costs because of fuel prices. "The only way to get around that is more productivity and more efficiency."

The good news: Technology can address the issues of productivity, efficiency, visibility and risk. The challenge: When supply chain experts say "technology," they're talking about more than RFID tags, GPS and temperature sensors.

CIOs need to think about supply chain metadata -- the information about the supply chain that's stored, transmitted and updated in such a way that IT can help procurement experts monitor and protect all of the intricate, interconnected pieces of the supply chain.

"The world is changing at such a fast pace," sums up CIPS' Scott. "People have to think on their feet because the risks are unprecedented."

Monitor multiple points of vulnerability

Perhaps the biggest challenge relating to supply chain vulnerability comes from the unforeseen risk that any given link will fail, an increased scenario given today's extended, multi-tier supply chains. "The points of vulnerability are greater than they ever were," says Ben Zelinsky, director in the supply chain technology practice at PricewaterhouseCoopers. "Because supply chains are outsourced and subcontracted, controlling each point becomes more difficult."

Explains his colleague Glen Goldbach, director in the operations and supply chain practice, "You may have protected yourself by having two tier-1 suppliers for the same component, but if the same tier-2 supplier serves both of them, and that company fails, you lose the entire chain."

1 2 3 4 Page
Join the discussion
Be the first to comment on this article. Our Commenting Policies