Strengthening Supply Chain Security With Secure Access - Industry Today - Leader in Manufacturing & Industry News

Industry’s Media Platform of Choice
Champion Your Brand in Front of Decision Makers and Extend Your Reach Get Featured in the SPOTLIGHT

 

March 21, 2024 Strengthening Supply Chain Security With Secure Access

How modern secure remote access technologies are strengthening supply chain security and the supply chain ecosystem as a whole.

By Kevin Kumpf, Chief OT/ICS Strategist at Cyolo

Amidst booming cybersecurity budgets, the vulnerability of supply chain components remains a pressing concern for organizations spanning a multitude of industries. Recognizing the critical need to secure and control access to internal platforms and ecosystems, Tata Chemicals, mines trona, a naturally occurring soft-rock mineral. Tata partnered with Cyolo to deploy a Remote Privileged Access Management (RPAM) solution. This platform is built upon the foundation of secure remote access, identity access management, privileged access management and zero trust access.

Granular access control functions enable organizations to control user access and application features such as copy, paste, and file actions. With complete oversight of both internal and third-party environments, security teams can set access controls, approve certain devices and instill user and application restrictions within the network. In supply chain ecosystems, certain granular access control capabilities including session recording, localized user and password management (important if you lack Active Directory), just-in-time access and multi-factor authentication (MFA) are vital for secure, efficient operations.

The implementation of granular access control functions not only safeguarded Tata Chemicals’ internal networks but also significantly strengthened their connections with supply chain partners, which in turn benefits the entire supply chain ecosystem.

With integrated granular access control, Tata Chemicals can address immediate security concerns in both operational technology (OT) and information technology (IT) environments and work through a comprehensive cybersecurity roadmap.

For example, while IT handles the digital side of things, managing software and electronic data, OT delves into the physical world, controlling and monitoring machines and devices. Compromised IT systems affect data, while vulnerable OT systems can put physical operations at risk, and place workers in danger of physical harm.

This resulted in an over 40% reduction in the time required to grant secure access to remote vendors, ultimately enhancing operational efficiency and strengthening security controls for external parties. By integrating the solution in just hours, Tata Chemicals achieved increased agility and enhanced security, realizing value significantly faster than traditional deployments.

Beyond securing internal networks, the implementation of modern security technologies had a cascading effect on supply chain security. By establishing secure and safe connections with supply chain partners, Tata Chemicals not only fortified their own cybersecurity but also positively impacted the security of their entire supply chain ecosystem. The streamlined access management processes and stringent security controls resulted in a more resilient and secure supply chain network.

Tata Chemicals partnered with Cyolo, leveraging the company’s unified user application control. This decision provided Tata with tools to resolve immediate security challenges while establishing more secure and safe connections with supply chain partners in the long term. These enhanced security measures are contributing to the resilience and safety of their broader supply chain ecosystem.

About Kevin:
Kevin Kumpf has more than 20 years of IT security and compliance experience, including over 10 years of cybersecurity, governance and critical infrastructure experience working in the energy, medical, manufacturing, transportation and FedRAMP realms. Kevin’s past roles include Director of OT Security (N.A.) for Iberdrola, where he oversaw the security, and regulatory compliance of multiple OpCo’s, and Principal Security and Regulatory Lead for interactions with the NY and NE ISO’s, NERC, ISAC’s as well as state and federal entities. He has also worked internally and as a vendor/consultant at multiple healthcare and manufacturing entities to mitigate the threats they were under in relation to ransomware, insider threats and malware infestation. Today Kevin works as the OT Technical Lead at Cyolo.

 

Subscribe to Industry Today

Read Our Current Issue

Made To Stay: Attracting Gen Z Into Manufacturing

Most Recent EpisodeAn Ambition To Be a Great Leader

Listen Now

A childhood in Kansas, college in California where she met her early mentor, Leigh Lytle spent 15 years in the Federal Reserve Banking System and is now the 1st woman President & CEO of the Equipment Leasing & Finance Association. Join us to hear about her ambition to be a great leader.