Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Cyber resilience: Protecting the vaccine supply chain

By Kevin Brown
vaccine covid
February 24, 2021

As pharmaceutical companies and healthcare organizations turn their attention from the development to the deployment of coronavirus vaccines, well-resourced cybercriminals are hotly following suit. The vaccine supply chain is rife with logistical complexities making the enormously valuable data on the various vaccines deeply attractive to threat actors. In fact, cybercriminals are already attempting to steal vaccine formulas and disrupt operations. Recently, a global phishing campaign targeting organizations associated within the COVID-19 “cold chain” was uncovered— and we must anticipate many more similar attacks.

Cyberattacks on vaccine supply chains can literally be life-threatening. One click can cripple plans to immunize the masses. As attack surfaces expand, it’s essential that players in the highly intertwined network of big pharma, biotech, manufacturing, health and clinical research become more cyber resilient by taking a number of steps to prepare for potential attacks.

 

Adopt a zero trust approach

In the age of digitalization, where traditional approaches to security do not stack up against the sophistication of today’s threats, the adoption of zero trust can give the vaccine’s supply chain players the robust base to prevent sophisticated attacks. At a simple level, zero trust assumes that no process is automatically trustworthy, and instead constantly authenticates users and protects the flow of sensitive data within an organization. Albeit not directed at vaccine supply chain, the recent SolarWinds attack is a timely reminder that zero trust should extent to what, on first appearance, could be authenticated trust as well. By eliminating the traditional network perimeter and treating all activity as a potential threat or unknown user, zero trust can be used for micro-segmentation of networks, to enforce control points, and to constantly monitor applications in use and map network activity looking for the anomalous pattern or behavior. Whatever role an organization plays in the vaccine distribution network, zero trust can protect from typical malware attacks through to more sophisticated and targeted breaches.

If the vaccine supply chain players do not have a zero trust approach married to their cybersecurity strategy, one click by an employee on a hackers’ email can cost everyone in the ecosystem heavily.

 

Leverage cyber threat intelligence

If cybercriminals are able to gain access to vaccine information, encrypt it and withhold it, how much would that cost, even just for one day for the vaccine supply to not be disrupted? While the financial cost could be significant, the cost in human life could be even greater. It’s essential that organizations playing a role in the distribution of the vaccine have full sight of the scope of threats they may be facing, and maintain and update their defenses regularly, leveraging AI and automation where possible. By working with an external partner that knows what to look for and provides true, actionable threat intelligence, organizations involved in the vaccine will be able to get early visibility into cyberattacks and act quickly.

Adopting technologies that prevent and disrupt attacks like predictive analytics, which utilizes artificial intelligence and automation to enable faster proactive detection and analyze anomalies, should be an immediate priority. This technology rapidly analyzes real-time data and builds predictive models that forecast and anticipate threats, and allows involved parties to automatically put defenses in place before cyberattacks happen, ensuring that the vaccine gets distributed as safely and efficiently as possible.

 

Create incident response plans

Unfortunately, what COVID-19 has shown us is that many business leaders don't think about disaster recovery until it's too late. The crisis has crippled many organizations unprepared for the sudden challenges it has presented us. This underlines how critical risk assessment and disaster recovery planning is for the vaccine distribution network. Every player should future-proof their disaster recovery and security response by deploying new systems that are capable of securely supporting the regulatory frameworks they work within. With so much uncertainty around vaccine distribution, businesses must be able to react as fast as the threat actors themselves.

Employee education around security protocols needs to be carefully worked into the plan. Each person across the supply chain is a potential victim. All it takes is one set of compromised credentials — the attacker only has to win once. COVID-19 showed many business leaders that failing to properly educate employees about security was a crippling weak link — millions downloaded insecure software and fell victim to phishing emails simply because they didn't have the educational resources. While this was a risk prior to COVID, it has become a matter of life and death since the vaccine distribution process has started. Organizations should work to identify all possible risks that could be avoided through effective education and ensure every employee understands how they can do their part to keep the business secure.

COVID has accelerated the already prominent threat of cybercriminals. With the vaccine in play, and a post-pandemic world on the horizon, the stakes have never been higher. To ensure no disruptions, all parties involved in the vaccine supply chain need to take proper precautions. Cyber resilience is not an option going forward; it’s a necessity.

KEYWORDS: COVID-19 critical infrastructure cyber security hackers risk management supply chain security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin Brown is Managing Director of BT Security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Man in warehouse at computer

    Supply chain security must include cyber resilience

    See More
  • Port of Los Angeles to implement a cybersecurity operations center

    Port of Los Angeles to secure its supply chain with a Cyber Resilience Center

    See More
  • Protecting the Food Supply Chain: Looking for a New Animal ID System

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing