{"id":2287,"date":"2020-04-23T15:34:15","date_gmt":"2020-04-23T14:34:15","guid":{"rendered":"http:\/\/sfresources.wpengine.com\/?p=2287"},"modified":"2022-12-26T11:09:34","modified_gmt":"2022-12-26T11:09:34","slug":"taking-a-new-approach-to-security-in-the-defense-supply-chain","status":"publish","type":"post","link":"https:\/\/intelligence.supplyframe.com\/ja\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/","title":{"rendered":"Taking a New Approach to Security in The Defense Supply Chain"},"content":{"rendered":"<p>Given the importance of every element in the defense supply chain, it makes sense that airtight security would be a major focus. The goal has always been a zero-tolerance approach to security issues. However, the reality is that these supply chains are simply too complex.<\/p>\n\n\n\n<p>How is it possible to manage something that spans the globe and incorporates countless people in the process? It\u2019s clear that our current approach isn\u2019t working. The only solution is to change how we approach this key element of the supply chain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-a-growing-concern-in-the-defense-supply-chain\">A Growing Concern in The Defense Supply Chain<\/h3>\n\n\n\n<p>The defense supply chain is enormous, but even the smallest of intrusions can call its entire security into question. Take for example the story that&nbsp;<a href=\"https:\/\/www.bloomberg.com\/news\/features\/2018-10-04\/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies?srnd=businessweek-v2\" target=\"_blank\" rel=\"noreferrer noopener\">Bloomberg broke in 2018<\/a>.<\/p>\n\n\n\n<p>A microchip, roughly the size of a single grain of rice, found its way onto motherboards. These were, in turn, placed inside servers everywhere. This chip was not part of the design. Despite this, it somehow found its way into multiple servers. These include Amazon, the US Department of Defense (DOD), CIA drone operations, and even a ship in the US Navy.<\/p>\n\n\n\n<p>The chip, small as it was, allowed the creator to open a backdoor into the network. This compromises all of the information within. Unlike your usual website hacks, this was something deliberate, intentional, and very difficult to achieve. And yet, it still happened.<\/p>\n\n\n\n<p>The thread lead back to China, who produces a vast majority of the world\u2019s electronics. It was a worse case scenario, but could it have been prevented? It was revealed that the problem originated within the factories where it was made, and somehow passed through all of the supply chain without triggering any alarms.<\/p>\n\n\n\n<p>Both the manufacturer and the customers denied the accuracy of the report, but the topic was already out there. It was time to rethink security in the defense supply chain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-putting-the-focus-where-it-belongs\">Putting The Focus Where it Belongs<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/focus.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>The US Department of Defense started by looking at lower-tier suppliers who may have holes in their security. The problem with that approach, however, was the sheer number of them.<\/p>\n\n\n\n<p>The Pentagon alone has contracts with thousands of companies, who in turn have their own contracts and suppliers. In fact, major contractor Lockheed Martin has over&nbsp;<a href=\"https:\/\/247wallst.com\/special-report\/2018\/07\/02\/americas-15-biggest-defense-contractors\/2\/\" target=\"_blank\" rel=\"noreferrer noopener\">16,000 suppliers of their own<\/a>.<\/p>\n\n\n\n<p>The best place to start is by looking at what needs to change. This is where the Government Accountability Office (GAO) High-Risk report helps paint a better picture. In the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.gao.gov\/assets\/700\/697245.pdf\" target=\"_blank\">2019 version of the report<\/a>, two major areas appear as high-risk parts of the defense supply chain:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Asset Visibility \u2013&nbsp;<\/strong>The ability to pinpoint the location, quantity, condition, and status of inventory across the supply chain. The DOD identifies opportunities to better track cargo movements as a specific example<\/li>\n\n\n\n<li><strong>Material Distribution \u2013<\/strong>&nbsp;This refers to the supply chain\u2019s ability to deliver products at the right cost and within the correct timeline. A lack of delivery data, combined with unmet deadlines contributes to this issue<\/li>\n<\/ul>\n\n\n\n<p>With this focus in mind, the DOD also introduced a new initiative entitled \u201cDeliver Uncompromised,\u201d in June of 2018. The concept focuses on sourcing, adding a focus on security in addition to price, delivery, and performance.<\/p>\n\n\n\n<p>By positioning security as a focus during the inception of a product, designers can more effectively tailor their sourcing. The goal is to avoid questionable or gray market suppliers that have led to security issues in the past.<\/p>\n\n\n\n<p>This is all moving in the right direction, but it doesn\u2019t address the issue of smaller suppliers deeper down the supply chain. It\u2019s here that we have an opportunity to understand the source of the problems and steps we can take to fix it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-people-and-suppliers-are-the-secret\">People and Suppliers are The Secret<\/h3>\n\n\n\n<p>Taking a step back, it really comes down to the means of individual organizations in the supply chain. While larger ones are going to have the time and resources to properly vet their suppliers, smaller to mid-sized businesses simply don\u2019t have the means.<\/p>\n\n\n\n<p>While speaking at a cybersecurity conference in Virginia, Federal Chief Information Security Officer Grant Schneider mentioned a potential model to weight security risks in both purchasing and procurement.<\/p>\n\n\n\n<p>A model like this, as Schneider put it, would naturally lead both the private and federal sector to discriminate against lower cost and simultaneously low-security parts.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWe\u2019re very much looking for feedback on how we do market incentives, where we can focus in the federal government, because I don\u2019t believe the free market is necessarily going to get us there in cybersecurity. At least, it\u2019s not going to get us there fast enough.\u201d<\/p>\n<cite>\u2013 Federal Chief Information Security Officer Grant Schneider<\/cite><\/blockquote>\n\n\n\n<p>So part of it comes down to cooperation between regulations and suppliers of all sizes, but it\u2019s also important to consider the power of people. The individuals who work within the supply chain are simultaneously the most powerful and most vulnerable aspects of all.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-empowering-the-people-in-your-supply-chain\">Empowering The People in Your Supply Chain<\/h3>\n\n\n\n<p>We\u2019ve seen incidents in the past where a single set of hacked credentials can lead to&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/china-hacked-a-navy-contractor-and-secured-a-trove-of-highly-sensitive-data-on-submarine-warfare\/2018\/06\/08\/6cc396fa-68e6-11e8-bea7-c8eb28bc52b1_story.html?utm_term=.481c2560324d\" target=\"_blank\" rel=\"noreferrer noopener\">massive data leaks<\/a>. On the opposite side of the spectrum, however, it\u2019s possible to fortify this aspect of the supply chain by better empowering people and their individual security measures.<\/p>\n\n\n\n<p>One example would be a better method of accountability. By closely monitoring the activity of individuals working on sensitive projects, it becomes possible to spot discrepancies in their activity, suggesting that their credentials could be compromised.<\/p>\n\n\n\n<p>Ultimately, it comes down to using the right tools. If the DOD\u2019s \u201cDeliver Uncompromised\u201d wishes contractors and suppliers to incorporate security into the very design of a product, then it all starts with the knowledge and tools people need to make smarter, more secure decisions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-a-trusted-solution\">A Trusted Solution<\/h3>\n\n\n\n<p>One of the most common entry points for compromised components is during the sourcing and procurement stage of the process. Faced with a shortage, long lead times, or other obstacles, purchasers turn to any solution they can find. As a result, components from low-security sources or grey markets enter the supply chain.<\/p>\n\n\n\n<p>What if we could prevent that decision from ever happening? By giving your teams access to trusted distributors and the ability to pinpoint or predict problems ahead of time, you remove the need for desperate decision-making.<\/p>\n\n\n\n<p>With&nbsp;<strong>Findchips Pro,&nbsp;<\/strong>the ability to compare parts on your BOM lets you quickly find a trusted alternative from any one of our secure distributors. Moreover, our proprietary Risk Rank algorithm gives you deep insight into each part. Using this score provides a window into the potential future of any component.<\/p>\n\n\n\n<p>Security is a top priority in the defense supply chain, and it starts with giving people the tools they need to make smarter decisions.&nbsp;<a href=\"http:\/\/pro.findchips.com\/\">Schedule a demo of Findchips Pro<\/a>&nbsp;today, and discover how this one decision can offer a brighter future for your supply chain.<\/p>","protected":false},"excerpt":{"rendered":"<p>Given the importance of every element in the defense supply chain, it makes sense that airtight security would be a major focus. The goal has always been a zero-tolerance approach to security issues. However, the reality is that these supply chains are simply too complex. How is it possible to manage something that spans the globe and incorporates countless people in the process? It\u2019s clear that our current approach isn\u2019t working. The only solution is to change how we approach this key element of the supply chain. A Growing Concern in The Defense Supply Chain The defense supply chain is enormous, but even the smallest of intrusions can call its [&hellip;]<\/p>","protected":false},"author":2,"featured_media":2324,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[7,222,225,210,102,211],"tags":[69,77],"class_list":["post-2287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-direct-source","category-industrial-manufacturing","category-industries","category-resources","category-solutions","tag-security","tag-supply-chain"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3 (Yoast SEO v25.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Taking a New Approach to Security in The Defense Supply Chain - Supplyframe<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intelligence.supplyframe.com\/ja\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Taking a New Approach to Security in The Defense Supply Chain\" \/>\n<meta property=\"og:description\" content=\"Given the importance of every element in the defense supply chain, it makes sense that airtight security would be a major focus. The goal has always been a zero-tolerance approach to security issues. However, the reality is that these supply chains are simply too complex. How is it possible to manage something that spans the globe and incorporates countless people in the process? It\u2019s clear that our current approach isn\u2019t working. The only solution is to change how we approach this key element of the supply chain. A Growing Concern in The Defense Supply Chain The defense supply chain is enormous, but even the smallest of intrusions can call its [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intelligence.supplyframe.com\/ja\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"Supplyframe\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Supplyframe\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-23T14:34:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-26T11:09:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/6-1920x400.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1155\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex Peron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Supplyframe\" \/>\n<meta name=\"twitter:site\" content=\"@Supplyframe\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex Peron\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/\"},\"author\":{\"name\":\"Alex Peron\",\"@id\":\"https:\/\/intelligence.supplyframe.com\/#\/schema\/person\/e49f8823de1da9b2a8a3ebc800fe7717\"},\"headline\":\"Taking a New Approach to Security in The Defense Supply Chain\",\"datePublished\":\"2020-04-23T14:34:15+00:00\",\"dateModified\":\"2022-12-26T11:09:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/\"},\"wordCount\":1164,\"publisher\":{\"@id\":\"https:\/\/intelligence.supplyframe.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/6-1920x400.jpeg\",\"keywords\":[\"security\",\"supply chain\"],\"articleSection\":[\"Articles\",\"DirectSource\",\"Industrial Manufacturing\",\"Industries\",\"Resources\",\"Solutions\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/\",\"url\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/\",\"name\":\"Taking a New Approach to Security in The Defense Supply Chain - Supplyframe\",\"isPartOf\":{\"@id\":\"https:\/\/intelligence.supplyframe.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/6-1920x400.jpeg\",\"datePublished\":\"2020-04-23T14:34:15+00:00\",\"dateModified\":\"2022-12-26T11:09:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#primaryimage\",\"url\":\"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/6-1920x400.jpeg\",\"contentUrl\":\"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/6-1920x400.jpeg\",\"width\":2048,\"height\":1155,\"caption\":\"Taking a New Approach to Security in The Defense Supply Chain\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/intelligence.supplyframe.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Taking a New Approach to Security in The Defense Supply Chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/intelligence.supplyframe.com\/#website\",\"url\":\"https:\/\/intelligence.supplyframe.com\/\",\"name\":\"Supplyframe\",\"description\":\"Supply Chain Resources for Electronics Manufacturing Professionals\",\"publisher\":{\"@id\":\"https:\/\/intelligence.supplyframe.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/intelligence.supplyframe.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/intelligence.supplyframe.com\/#organization\",\"name\":\"Supplyframe\",\"url\":\"https:\/\/intelligence.supplyframe.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/intelligence.supplyframe.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/08\/supplyframe-logo.png\",\"contentUrl\":\"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/08\/supplyframe-logo.png\",\"width\":200,\"height\":45,\"caption\":\"Supplyframe\"},\"image\":{\"@id\":\"https:\/\/intelligence.supplyframe.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Supplyframe\",\"https:\/\/x.com\/Supplyframe\",\"https:\/\/www.instagram.com\/supplyframe\/?hl=en\",\"https:\/\/www.linkedin.com\/company\/supplyframe\/\",\"https:\/\/www.youtube.com\/channel\/UCQshZe3jEHdF08FBZuZJKCg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/intelligence.supplyframe.com\/#\/schema\/person\/e49f8823de1da9b2a8a3ebc800fe7717\",\"name\":\"Alex Peron\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/intelligence.supplyframe.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9dde84f14f9509b91fea5d1ee1d1860307b8ee321378763d9475e3d896436ed9?s=96&d=https%3A%2F%2Fintelligence.supplyframe.com%2Fwp-content%2Fuploads%2F2023%2F05%2Flogo-icon-white-1.png&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9dde84f14f9509b91fea5d1ee1d1860307b8ee321378763d9475e3d896436ed9?s=96&d=https%3A%2F%2Fintelligence.supplyframe.com%2Fwp-content%2Fuploads%2F2023%2F05%2Flogo-icon-white-1.png&r=g\",\"caption\":\"Alex Peron\"},\"url\":\"https:\/\/intelligence.supplyframe.com\/ja\/author\/aperon\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Taking a New Approach to Security in The Defense Supply Chain - Supplyframe","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intelligence.supplyframe.com\/ja\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/","og_locale":"ja_JP","og_type":"article","og_title":"Taking a New Approach to Security in The Defense Supply Chain","og_description":"Given the importance of every element in the defense supply chain, it makes sense that airtight security would be a major focus. The goal has always been a zero-tolerance approach to security issues. However, the reality is that these supply chains are simply too complex. How is it possible to manage something that spans the globe and incorporates countless people in the process? It\u2019s clear that our current approach isn\u2019t working. The only solution is to change how we approach this key element of the supply chain. A Growing Concern in The Defense Supply Chain The defense supply chain is enormous, but even the smallest of intrusions can call its [&hellip;]","og_url":"https:\/\/intelligence.supplyframe.com\/ja\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/","og_site_name":"Supplyframe","article_publisher":"https:\/\/www.facebook.com\/Supplyframe","article_published_time":"2020-04-23T14:34:15+00:00","article_modified_time":"2022-12-26T11:09:34+00:00","og_image":[{"width":2048,"height":1155,"url":"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/6-1920x400.jpeg","type":"image\/jpeg"}],"author":"Alex Peron","twitter_card":"summary_large_image","twitter_creator":"@Supplyframe","twitter_site":"@Supplyframe","twitter_misc":{"\u57f7\u7b46\u8005":"Alex Peron","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"6\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#article","isPartOf":{"@id":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/"},"author":{"name":"Alex Peron","@id":"https:\/\/intelligence.supplyframe.com\/#\/schema\/person\/e49f8823de1da9b2a8a3ebc800fe7717"},"headline":"Taking a New Approach to Security in The Defense Supply Chain","datePublished":"2020-04-23T14:34:15+00:00","dateModified":"2022-12-26T11:09:34+00:00","mainEntityOfPage":{"@id":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/"},"wordCount":1164,"publisher":{"@id":"https:\/\/intelligence.supplyframe.com\/#organization"},"image":{"@id":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/6-1920x400.jpeg","keywords":["security","supply chain"],"articleSection":["Articles","DirectSource","Industrial Manufacturing","Industries","Resources","Solutions"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/","url":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/","name":"Taking a New Approach to Security in The Defense Supply Chain - Supplyframe","isPartOf":{"@id":"https:\/\/intelligence.supplyframe.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#primaryimage"},"image":{"@id":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/6-1920x400.jpeg","datePublished":"2020-04-23T14:34:15+00:00","dateModified":"2022-12-26T11:09:34+00:00","breadcrumb":{"@id":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#primaryimage","url":"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/6-1920x400.jpeg","contentUrl":"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/04\/6-1920x400.jpeg","width":2048,"height":1155,"caption":"Taking a New Approach to Security in The Defense Supply Chain"},{"@type":"BreadcrumbList","@id":"https:\/\/intelligence.supplyframe.com\/taking-a-new-approach-to-security-in-the-defense-supply-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/intelligence.supplyframe.com\/"},{"@type":"ListItem","position":2,"name":"Taking a New Approach to Security in The Defense Supply Chain"}]},{"@type":"WebSite","@id":"https:\/\/intelligence.supplyframe.com\/#website","url":"https:\/\/intelligence.supplyframe.com\/","name":"Supplyframe","description":"Supply Chain Resources for Electronics Manufacturing Professionals","publisher":{"@id":"https:\/\/intelligence.supplyframe.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intelligence.supplyframe.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/intelligence.supplyframe.com\/#organization","name":"Supplyframe","url":"https:\/\/intelligence.supplyframe.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/intelligence.supplyframe.com\/#\/schema\/logo\/image\/","url":"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/08\/supplyframe-logo.png","contentUrl":"https:\/\/intelligence.supplyframe.com\/wp-content\/uploads\/2020\/08\/supplyframe-logo.png","width":200,"height":45,"caption":"Supplyframe"},"image":{"@id":"https:\/\/intelligence.supplyframe.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Supplyframe","https:\/\/x.com\/Supplyframe","https:\/\/www.instagram.com\/supplyframe\/?hl=en","https:\/\/www.linkedin.com\/company\/supplyframe\/","https:\/\/www.youtube.com\/channel\/UCQshZe3jEHdF08FBZuZJKCg"]},{"@type":"Person","@id":"https:\/\/intelligence.supplyframe.com\/#\/schema\/person\/e49f8823de1da9b2a8a3ebc800fe7717","name":"Alex Peron","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/intelligence.supplyframe.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9dde84f14f9509b91fea5d1ee1d1860307b8ee321378763d9475e3d896436ed9?s=96&d=https%3A%2F%2Fintelligence.supplyframe.com%2Fwp-content%2Fuploads%2F2023%2F05%2Flogo-icon-white-1.png&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9dde84f14f9509b91fea5d1ee1d1860307b8ee321378763d9475e3d896436ed9?s=96&d=https%3A%2F%2Fintelligence.supplyframe.com%2Fwp-content%2Fuploads%2F2023%2F05%2Flogo-icon-white-1.png&r=g","caption":"Alex Peron"},"url":"https:\/\/intelligence.supplyframe.com\/ja\/author\/aperon\/"}]}},"_links":{"self":[{"href":"https:\/\/intelligence.supplyframe.com\/ja\/wp-json\/wp\/v2\/posts\/2287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intelligence.supplyframe.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intelligence.supplyframe.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intelligence.supplyframe.com\/ja\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/intelligence.supplyframe.com\/ja\/wp-json\/wp\/v2\/comments?post=2287"}],"version-history":[{"count":0,"href":"https:\/\/intelligence.supplyframe.com\/ja\/wp-json\/wp\/v2\/posts\/2287\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intelligence.supplyframe.com\/ja\/wp-json\/wp\/v2\/media\/2324"}],"wp:attachment":[{"href":"https:\/\/intelligence.supplyframe.com\/ja\/wp-json\/wp\/v2\/media?parent=2287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intelligence.supplyframe.com\/ja\/wp-json\/wp\/v2\/categories?post=2287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intelligence.supplyframe.com\/ja\/wp-json\/wp\/v2\/tags?post=2287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}