Skip to the content

Supply managers face a daunting challenge when it comes to data. Sharing data with suppliers can improve efficiency, flexibility, quality, and new product development. But there are risks to intellectual property, corporate, and personal information, as well as regulatory and legal concerns, and attacks that could severely impair the organization. Given the benefits, supply managers face pressure to share increasingly sensitive data but face challenges in securing systems and preventing breaches.

The new CAPS Research report Digital Connectivity and Data Protection in Supply Management examines risks, challenges, and best practices for sharing and protecting data.

Today, buyers and suppliers are more connected than ever. Organizations benefit from sharing data with suppliers to improve efficiency, flexibility, quality, and new product development. But those connections carry risks as well.

Though high-profile breaches of personally identifiable information (PII) have been made public, there have been relatively few reports of operational data breaches. This could mean protection plans are effective or it could indicate that companies aren’t aware they have been breached or are reluctant to go public unless legally required.

Organizations face an array of risks in managing relationships with suppliers and multiple tiers of suppliers. The growing use of connected devices, outsourced suppliers, and international supply chains elevate the challenge.

Factors that complicate data sharing

Attackers often look for weak links among smaller companies without sophisticated technology or security partners. That means your supply chain partners are on the front lines of protecting your organization's data. Here are a challenges companies encounter when sharing data:

Technological differences. Not all parties use the latest protection standards, technology, and policies.

Procedural differences. If they exist at all, policies and procedures can lead to confusion and gaps in protecting data.

Employee training. Suppliers may not have adequate employee training in managing and handling confidential information, reporting breaches and incidents, and overall cybersecurity threats and intrusion strategies that lead to vulnerabilities.

Monitoring. It's difficult to track data use and distribution at supplier locations, especially if that information is further dispersed into the sub-tiers of the supply base Assessing supplier policies, procedures, and governance is critical, as well as, ensuring supplier management practices validate data protection & governance procedures are adequate.

Communications. While under investigation, information about attacks and breaches may be delayed or, in case of a loss, heavily filtered.

Legal liability. Establishing and enforcing liability is difficult, even when covered in contracts. It's even tougher with international relationships.

Tensions in security

Organizations face tradeoffs in managing security and business requirements.

Protection vs. Speed: Assessing & validating data protection requirements slow supplier selection, qualification, and onboarding.

Protection vs. Cost: Requirements may eliminate low-cost provider options.

Protection vs. Agility: Supplier base could be limited to only sophisticated suppliers that can meet requirements.

There's an overlap between internal data security and external security in relationships with suppliers. Both aspects are built on technology, people, and processes. As part of the supplier due diligence and evaluation process, organizations should examine suppliers’ capabilities in managing the risks inherent in sharing data. Although it may not be possible to eliminate performance tradeoffs, understanding the gaps and looking for alignment between the organizations in the risk areas will help guide the process. The tensions mentioned will be a part of that process, as business priorities compete with security considerations.

After considering risks and relationships, it's helpful to look at best-in-class organizations that are effectively addressing these issues. In the next post, we'll look at best practices on defending sharing needs, qualifying suppliers, diligence in contracting, onboarding, supplier management, and ongoing evaluation.

Looking for more?

Read more about best practices for sharing and protecting data, from our digital connectivity research. CAPS members can access Digital Connectivity and Data Protection in Supply Management in the CAPS Library now.

About the author

CAPS Research

CAPS Research

Take a survey,
get a report

Non-members can receive the report of each survey they submit.
Members can access all reports, but are encouraged to submit surveys to
increase the comparative breakouts only they receive.