Supply chain 2013: Stop playing whack-a-mole with security threats
As supply chain threats grow ever more sophisticated, companies tap new technologies to protect their assets and deliver the goods.
Computerworld - IT leaders can be excused for feeling like their supply chains are one link away from disintegration these days. The news over the past few months has been alarming, from outcries over horsemeat in Europe and mislabeled fish in New York to the longer-term impacts on supply chains from environmental events like the tsunami in Japan, monsoons in Thailand and the volcano in Iceland.
And those are just the highly publicized issues. Increasingly, CIOs are challenged to protect their supply chain from physical and cybertheft, counterfeiting, potential scarcity of materials and regulatory mandates such as removing lead from materials. Welcome to Whack-a-Mole, supply chain-style, where you attack one problem, only to have another pop up elsewhere.
Experts say the problem is only going to get worse. "Globalization lengthens supply chains and increases complexity," says Emma Scott, spokesperson for the Chartered Institute of Procurement and Supply (CIPS) in London, the professional organization of procurement professionals. "When supply chains are leaner, any disruption affects you more" -- and, thanks to a decade or more of globalization and cost-cutting, supply chains these days are very lean.
This makes the issue of visibility into the supply chain -- or the lack of same -- that much more critical, says Matt Smith, founder and chief strategy officer of Icix, a cloud-based exchange for supply chain partners based in South San Francisco, Calif. "Companies have visibility into purchasing and logistics, but not into where materials or ingredients or components are actually grown or manufactured. When you lose visibility, you get horsemeat in meatballs, e coli in spinach, lead in toys and worse."
Then there's velocity to consider. "You have to move information faster to enable the supply chain to react to changes. Velocity allows us to plan more aggressively. That's what wakes me up in the morning," says Nathan Johnson, CIO of Ports America, which manages 42 ports around the United States. One of his big concerns: spikes in transport costs because of fuel prices. "The only way to get around that is more productivity and more efficiency."
The good news: Technology can address the issues of productivity, efficiency, visibility and risk. The challenge: When supply chain experts say "technology," they're talking about more than RFID tags, GPS and temperature sensors.
CIOs need to think about supply chain metadata -- the information about the supply chain that's stored, transmitted and updated in such a way that IT can help procurement experts monitor and protect all of the intricate, interconnected pieces of the supply chain.
"The world is changing at such a fast pace," sums up CIPS' Scott. "People have to think on their feet because the risks are unprecedented."
Monitor multiple points of vulnerability
Perhaps the biggest challenge relating to supply chain vulnerability comes from the unforeseen risk that any given link will fail, an increased scenario given today's extended, multi-tier supply chains. "The points of vulnerability are greater than they ever were," says Ben Zelinsky, director in the supply chain technology practice at PricewaterhouseCoopers. "Because supply chains are outsourced and subcontracted, controlling each point becomes more difficult."
Explains his colleague Glen Goldbach, director in the operations and supply chain practice, "You may have protected yourself by having two tier-1 suppliers for the same component, but if the same tier-2 supplier serves both of them, and that company fails, you lose the entire chain."
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!