CV_MarApr_23

To evolve 5G supply chain risk management past a “restrictions-only” approach to SCRM, the United States and like-minded nations have agreed to the Prague Proposals to provide guidance for governments on how to manage risk while maintaining a diverse and competitive marketplace. The Proposals put a large emphasis on supply chain security and trust, stating “governments should ensure that domestic telecoms networks, including open and interoperable ones, are subject to a rigorous evaluation of equipment and infrastructure suppliers that take into account risk profiles, including the rule of law, the security environment, ethical supplier and transparent financing practices, and adherence to the latest security standards and best practices.” Governments are adhering to those principles which has led to industry-led standards to achieve them. One prominent effort in that direction is SCS 9001: The Cybersecurity and Supply Chain Standard developed by the Telecommunications Industry Association. The Prague Proposals encourage the responsible behavior of all providers and vendors in the management of their critical supply chains. This is particularly important for those operating in support of national security installations and critical infrastructure sectors, given that a breach of communications systems serving those customers can have significant negative effects on national security. Adhering to SCS 9001 helps telecommunications demonstrate responsible behavior. The security standard covers the entire product lifecycle including supply chains to ensure that products and services are trustworthy. SCS 9001 requires organizations to collect, analyze and report their security performance based on a defined set of measures. In addition to security factors, they also include business practices and other corporate principles such as affiliations by key employees, including the Board of Directors, with political parties or government entities and policies on compliance with international laws and standards pertaining to corrupt practices or bribery. Monitoring risk factors can be a daunting task, however. Fortunately, just like with the telecommunications industry, the supply chain risk analysis field is benefitting from rapid innovations. Artificial intelligence and machine learning enable the harnessing of massive amounts of data to evaluate and monitor existing and potential business relations and demonstrate compliance to standards and regulations. Such technologies can be deployed across the telecommunications vendor space. Reducing sources of risk in telecommunications componentry will be crucial for the continued roll-out of the 5G network. And it will ensure that suppliers that can be trusted stay a step ahead of the competition in providing the network of the future. o Bob Kolasky is the senior vice president for critical infrastructure at Exiger. 33 MARCH - APRIL 2023 | CHANNELV ISION Why did we partner with Cradlepoint? • Day-1 connectivity • Failover management for branch continuity • A true hybrid redundant solution Watch our on-demand webinar at: GoBlackfoot.com/Cradlepoint

RkJQdWJsaXNoZXIy NTg4Njc=