Business continuity and the supply chain

What is the best way to build a business continuity plan that outlines alternative suppliers?

“Make sure resilience is built in as you design things.“

Marc Avery, CISO and founder of the Cyberchain Alliance, talks to Sooraj Shah about how people, process and technology need to have resilience built in from the very beginning.

Marc Avery was a speaker at the very popular R3 cyber security conference, which ran from 15 to 24 September 2020. If you missed it, then it’s not too late: you can still watch on demand.

Video transcript:

What’s the best way to build a business continuity plan that outlines alternative suppliers?

Business continuity plans have a traditional context, and often seen as something that gets pulled out of the drawer maybe once a quarter, if organisations are lucky, and people see that and go through the business continuity plan and work backwards from that to see whether or not any improvements that they can make. Actually, business resilience now is much more important. As we’ve seen with the COVID pandemic, it’s much more important to consider those things from the very fundamental designs of a service.

So your people, your process, and technology have to have resilience built in. So I’m not saying there isn’t a place of business continuity plans. Clearly, these things need to be exercised, but actually making sure that resilience is embedded as you design things, as you build things, and of course, as you operate things, really does help to make it a less painful job as and when something goes wrong.

Such flexibility should be discussed with suppliers as well and not just relying upon commercial arrangements to have their resilience built-in. Taking that approach and sharing that with your suppliers as well. This is paramount.

Copyright Lyonsdown Limited 2021

Top Articles

Is your security in need of an update this Cybersecurity Awareness month?

Cyber security experts tell teiss about the evolving threat landscape and how organisations can bolster their cyber security defenses

A new case for end-to-end encryption

How a hacker group got hold of calling records and text messages deploying highly sophisticated tools that show signs of originating in China

Telcos in Europe put muscle behind firewalls as SMS grows

Messaging is set to be one of the biggest traffic sources for telcos worldwide prompting them to protect loss of revenue to Grey Route practices 

Related Articles

[s2Member-Login login_redirect=”” /]