Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Supply chain chaos is ramping up cyber risk

Supply chains are going digital faster than ever. It’s time to address cyber risk.

By Mike Karbassi
Risk Management Services
August 19, 2020

Until March, there was a consistent narrative about supply chains and technology.

Digitization had, gradually, come some way in the world of logistics. Manufacturers, shipping companies, and retailers — and the many other firms with solutions that represent the connective tissue between them — had been steadily integrating hardware and software technologies that leverage the internet (both “of things” and not).

Electronic scanners were replacing physical bills of lading and other paper documentation, which enabled instant updates to all parties as to the status of freight. Sensors had been integrated to measure not just location of goods but also their temperature while in transit. But despite advances, businesses involved in the movement of goods still had a long way to go to take full advantage of the technologies available.

That was then. Now, the COVID-19 pandemic has thrown these trends into hyperdrive, and the story has become one of rapid change.

When supply chains were disrupted across the globe at the onset of the pandemic, changes needed to be made on the fly. Early on, companies attempted to shift suppliers from ones that were locked down in China to ones that were available elsewhere. Shipping companies attempted to divert from ports that were suddenly inaccessible. Later, as cargo capacity in the skies dried up with canceled passenger flights, companies had to look for alternatives.

Amid this chaos, those organizations who had dragged their heels on digitizing were at a clear disadvantage: making big changes to operations on the fly is a lot easier with digital tools.

With the fragility of supply chains now laid bare, nearly half of logistics pros who were surveyed by the Journal of Commerce said they’ll be making substantial changes in operations due to COVID, with 76 percent of those likely to make investments in digitization specifically. As an article from the World Economic forum put it, “The transition to a new model for supply chains will be underpinned by a rapid and wholesale digitization of the paperwork that accompanies global trade.”

For a window into how this might play out, think about how many in-person interactions can be replaced with digital communications. These measures will be the leading edge.

As an executive at a supply chain solutions company, Blume Global, told Tech Republic: “With everybody working remote now, it’s awful hard to go into an office and scan things, and so, the newer technologies enable electronic signatures, enable taking pictures…so that they can get closure on the shipment, and closure on the invoicing. It’s very important to transition into a digital environment, and this has been a big push. We’re seeing companies needing this kind of capability very quickly.”

These may seem like simple measures. Perhaps you’ve seen already that delivery drivers dropping packages on your porch now take a picture for confirmation — hardly an earth shattering change. But even these minor updates seemed unnecessary until now. “Many logistics businesses regarded digital tools like software enabling electronic signatures or shipment location tracking as unnecessary expenses prior to the emergence of social distancing guidelines” said Brian Reed of GEODIS, in an interview with PYMNTS.com. “The COVID-19 pandemic is now prompting renewed interest and accelerated uptake”

 

Cyber risk to skyrocket – Protect your clients

With this sudden push to digitalization, cyber risk will become a major risk factor practically overnight for businesses that may have previously considered themselves to be “safely” offline. With the history of ransomware and other cyber disruptions in this industry — most notably the ransomware attack on Maersk in 2017 — cyberattacks are yet another way that logistics can be thrown into chaos, on top of the economic and governmental impacts of COVID.

As companies seek insurance for such attacks of their new always-on, online systems, brokers should consider more than just the standard Cyber policy.

Monoline cyber policies are constructed to fit the bill for risks faced by a broad swath of typical types of businesses, but will likely not offer coverage for Diversion of Shipment due to a cyberattack, a key coverage given the rise of ransomware and its potential to derail shipments. And if the policy offers any Business Interruption coverage, the sublimits offered may not be sufficient for the kind of financial risk a company faces in the event of a shutdown of shipments.

In the face of this unprecedented level of risk, brokers should look to new, specialized coverage for cyber risks associated with supply chains - because as the narrative around this industry and technology changes, so too must the level of protection.

KEYWORDS: COVID-19 cyber security information security risk management supply chain

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike karbassi

Mike Karbassi is the Head of Cyber Underwriting at Corvus. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • supply-chain-freepik1170.jpg

    A blueprint for cyber supply chain risk management

    See More
  • third-party-freepik1170x6.jpg

    The state of third-party cyber risk amid global chaos

    See More
  • network security

    Fourth-party risk management is essential for software supply chain security

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • Risk Analysis and the Security Survey, 4th Edition

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing