imageWhen I was a teenager and a group of us headed to the car for some fun, someone would inevitably yell “I’ve got shotgun,” kicking off a race to the car and a round of “discussions” before seating arrangements were finally settled – specifically, who got to sit in the front and who had to sit in the back.

The term “riding shotgun” is shorthand for “I’m riding up front” and while the practice of sitting up by the driver with a weapon to guard the horse-drawn stagecoaches of the Wild West is well documented, it appears that the actual term emerged somewhat later.

Back then, they must have had another name. Perhaps this much-loved (by drivers and passengers) guard was called the CSO (Chief Shotgun Operator), since he was responsible for risk mitigation on those coach rides and making sure passengers and freight made it to the destination as expected.

The CSO of today might feel a bit like they are still in the Wild Wild West, with potential threats lurking everywhere along the trail, especially when considering the challenges of enforcing cyber supply chain security.

While CSOs, CIOs and others in IT are no strangers to the threats to risk management for threats of all kinds, IT professionals tasked with protection of resources that might be part of national critical infrastructure have been bringing more focus to the issue of cyber supply chain integrity and risk. 

From a formal standpoint, the University of Maryland Cybersecurity Center provides this definition:

“The cyber supply chain can be described as the mass of IT systems—hardware, software, public, and classified networks-that together enable the uninterrupted operations of government agencies, companies, and international organizations. Attacks on the cyber supply chain can include malware inserted into software or hardware, vulnerabilities found by hackers, as well as compromised systems that are unwittingly brought in house. Tackling the problem of cyber supply chain protection requires new levels of collaboration among security, IT, and supply chain managers, taking into account the roles of developers, vendors, customers, and users.”

From an informal standpoint, there’s the case of the Trojan Mouse. Asked to test a company’s security without relying on e-mail or other traditional malware venues, NetraGard gutted a Logitech USB mouse, and stuffed it with its own circuit board. The team learned, from a social networking site, which antivirus software the company was using, and then wrote code to circumvent it. The next step was to get the mouse inside the company. Taking a page from the ancient Greeks who presented Troy with the gift of a wooden horse bearing hidden warriors, NetraGard repackaged the mouse and sent it to an employee as a modern day gift: A promotional item . . . bearing hidden code.

The take-home lesson, apart from the continuing relevancy of Greek mythology to modern society (beware of marketers bearing mice), is that when considering cyber supply chain security, the threats can come from just about anywhere, making the job of the CSO and other key players all the more challenging. While administrators building critical infrastructure may be more concerned that a typical CSO, as we rethink the cyber threat, and must be concerned about cyber espionage, it might be prudent to update our thinking to include cyber supply chain issues in our risk management processes.

The good news is that the cyber supply chain isn’t as chaotic as the Wild Wild West (companies, and countries, realize that to place a backdoor into every product they shipped would be to invite detection, which would mark the fiscal end to any such company as the market en mass reacted). But it does mean that companies large and small (and countries large and small) will need to develop new ways of ensuring transparency, trust, and security in their cyber supply chain. Expect IT to play a major role in this. In short, every organization is going to want a guard riding shotgun, and who better than the CSO?

 

More Microsoft Content on Trusted Supply Chain and Supply Chain Risk: