Security & Business Resilience / Security Newswire / Transportation/Logistics/Supply Chain/Distribution/ Warehousing

Technology ‘Biggest Risk to Supply Chain’ in 2014

Technology poses the biggest risk to businesses’ supply chains over the next 12 months, according to a report. 

In a survey of over 500 business continuity professionals from 71 countries by Zurich, 75% of respondents reported that they did not have full visibility of their supply chain and that 30% did not know where they fit into any of their suppliers’ priorities. Only 12% knew where they fit into all of their suppliers’ priorities.

Business continuity insurance is not just an insurance policy against an unlikely event, said the report. The potential for an ‘incident’ was demonstrated by 75% of respondents recording at least one supply chain disruption during 2012 with 42% of this disruption originating below the immediate supplier. The cost of this is clear as 15% experienced an annual loss in excess of €1 million while 9% experienced a single event that resulted in a loss in excess of €1 million. The key issue for those in the industry is that 62% of respondents felt that top management commitment to managing the supply chain is inconsistent or totally lacking.

Supported by Zurich and also by the Chartered Institute of Purchasing and Supply (CIPS), the report concludes that disruptions continue to have a significant impact on business performance and that the problem is not being effectively managed. One of the key challenges is to get consistent top management support for investing in improved supply chain resilience. Disruptions are not a matter of ‘if’ but ‘when’, so effectively tracking the entire supply chain is essential for reducing the immediate costs of disruption and managing the long term reputation of the business.

Further findings from the report include:

  • The leading impact following a disruption is loss of productivity with 55% experiencing this in the last year. 41% reported customer complaints and 33% experienced an increased cost of work and service outcome impaired
  • The biggest risk to the supply chain over the next 12 months was reported to be technology (23%) followed by regulations (17%)
  • The leading cause of supply chain disruption is unplanned IT or telecom outages with 55% of organizations surveyed experiencing some or high impact disruption as a result, followed in second place by adverse weather, experienced by 41% of firms, then outsourcer service failure at 37%
  • 49% of respondents state that half or less of their key suppliers have business continuity arrangements in place for their own needs

Nick Wildgoose, Global Supply Chain Product Manager at Zurich, commented: “It is clear from the results of the latest study that supply chain disruptions continue to have a significant impact on business performance. One of the key challenges is to get consistent top management support for investing in improved supply chain resilience. As a starting point it can be useful to look at your most profitable product or service and look at the profit impact of related supplier failure on your organization. This should get you some attention.”

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.