Collecting and screening "upstream"​ intelligence is a key to ensuring supply chain integrity and preventing cargo losses

Collecting and screening "upstream"​ intelligence is a key to ensuring supply chain integrity and preventing cargo losses

Cargo Theft is a billion-dollar issue, and current events that may have paused companies’ supply chains have created even higher risk. One common saying in the industry is “cargo at rest is cargo at risk.”

At our recently sponsored webinar, “Managing Supply Chain Integrity and Cargo Security to avoid threats and disruptions,” speaker Francisco Mateo presented a framework for helping businesses prevent disruption to their supply chains due to external events such as the global COVID-19 pandemic. One of the key points that Francisco made was that if you have a process for collecting and reviewing relevant intelligence on an ongoing basis, you can avoid or at least lessen the impact of any disruptions.

Another essential point was that when evaluating logistics suppliers, manufacturers consider the degree to which their logistics partners comply with standards such as:

  1. ISO 28000, the Transportation Asset Protection Associations Trucking Security Requirements (TAPA’s TSR),
  2. the Customs-Trade Partnership Against Terrorism (CTPAT),

as well as special requirements for Pharma companies. While not an explicit requirement in the standards, there is often a requirement for “ongoing assessment of risk and management review.” One way to accomplish that ongoing assessment was demonstrated by iThreat’s Joe Farino, who gave a brief demonstration of the iThreat FusionCenter platform. Collecting threat intelligence can be a laborious and time-intensive process, and modern automation can increase the challenge. The reason is that we are drowning in data as a society. iThreat’s threat intelligence programs allow you to find the correct early warning signals (as described by Francisco) and process them quickly and efficiently as possible to Pro-act, not React.

For more information about iThreat, see https://ithreat.com.

To view the archived webinar, go to:

https://us02web.zoom.us/rec/share/-ctyHpPQ1WROe6PJtnDjRKUIQN3daaa81yga86FfzE1ts4UlAIK118inaoFnh5Sj

 

Leave a reply

Your email address will not be published. Required fields are marked *