Supply Chain Security



The nation’s critical infrastructure provides the essential services that underpin American society.  Proactive and coordinated efforts are necessary to strengthen and maintain secure, functioning, and resilient critical infrastructure—including assets, networks, and systems. Resources available from ASIS International speak to those concerns.


If you are not an ASIS member, please take this opportunity to gain a sense of the quality
of our resources, which are normally offered exclusively to our members.


 Free Resources

Please note: You must login or create a profile to view these featured resources.

​Free Resources

Port Protection, Security Management, February 2015

According to current estimates, 4 million containers arrive in U.S. ports each year from around the world. Surprisingly, maritime security is often overlooked as an aspect of national security. In this article, experts discuss the vulnerabilities of America’s ports and the global supply chain. What affects the security of this aspect of the nation’s critical infrastructure?

  • The Security and Accountability for Every Port Act (SAFE) is just one of a number of laws and regulations designed to enhance port and maritime supply chain security.
  • A risk score, based on the ship’s manifest not its cargo, is assigned to a container by an automated targeting system.
  • The Department of Homeland Security is required to screen all cargo entering U. S. ports and physically scan high-risk cargo.
  • Only an estimated 4.1 percent of containers are currently x-rayed before they come to the U.S.
    Read how government agencies and persons on the front line of the port security assess the vulnerabilities and recommend solutions.
Critical Infrastructure Protection: Security Dependencies and Trends

The U.S. lists eighteen critical infrastructure (CI) sectors. This White Paper explores the role of the CI within the U.S. as it relates to the well-being of society.

  • Attacks on any sector could significantly disrupt the functioning of government and businesses, even those far beyond the location of the incident.
  • Hacking and malware intrusions affecting sensitive and proprietary networks have increased the vulnerability of the IT and communication networks that support CI.
  • Attacks using CI components as weapons of mass destruction would have devastating physical and psychological consequences throughout the nation.
  • This 32-page report covers a range of security solutions to these scenarios, from current gaps to protection advancements.

Not a member?Join now and gain access to all ASIS resources,
including information, education, networking, and more.


Members Only Resources

ASIS Supply Chain Risk Management: A Compilation of Best Practices (ASIS Standard)

This Standard was developed by ASIS International and the Supply Chain Risk Leadership Council (SCRLC), which includes world-class supply chain manufacturing and services organizations and academic institutions. It defines supply chain risk as the uncertainty in achieving an organization’s objectives throughout its supply chain.

  • Supply chain risk management (SCRM) involves the assessment and control of risk events at all points, from sources of raw materials to end use by customers and consumers.
  • SCRM is a dynamic discipline that should be integrated into business management and planning processes.
  • A supply chain security contract for external and third-party providers and examples of sources of risk to an organization and its supply chain.


 

Fictitious Cargo Thefts Create Food Safety Vulnerabilities (Seminar Session)

A fictitious pick-up, sometimes called a “deceptive pick-up,” is an identity theft scheme used to steal cargo. In this session, speaker Walter Fountain, CPP, director of corporate security for Schneider National, Inc., defines how the scheme works, who can be a victim, what fraudulent documents are used, and how freight shipments can be protected. He also offered these statistics:

  • The average value of cargo stolen in a fictitious pickup in 2013 was $154,134, a 44 percent increase from the year before.
  • Most fictitious pick-ups involve the theft of food and beverage because they are easy to fence.
  • About half of fraudulent pickups occur on Thursday or Friday when shippers and brokers are anxious to move freight out the door.
Subject Guide on Supply Chain Security (ASIS IRC Reference Guide)

View all published Security Spotlights                           Next month’s feature topic: Critical Infrastructure