Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
28
29
30
31
1
3
4
5
6
7
8
9
10
11
13
14
15
16
18
19
21
22
23
24
25
26
27
28
29
30
1
2
3
4
5
6
2014 National Health Leadership Conference
2014-06-02    
All Day
WELCOME! This conference is the largest national gathering of health system decision-makers in Canada including trustees, chief executive officers, directors, managers, department heads and other [...]
EMR : Every Step Conference and Vendor Showcase
2014-06-12    
8:00 am - 6:00 pm
OntarioMD is pleased to invite you to join us for the EMR: Every Step Conference and Vendor Showcase, an interactive day to learn and participate in [...]
GOVERNMENT HEALTH IT Conference & Exhibition
Why Attend? As budgets tighten, workforces shrink, ICD-10 looms, more consumers enter the healthcare system and you still struggle with meaningful use — challenges remain [...]
MD Logic EHR User Conference 2014
2014-06-20    
All Day
Who Should Attend: Doctors, PA’s, NP’s, PT’s, Administrators,Managers, Clinical Staff, IT Staff What is the Focus of the Conference: Meaningful Use Stage II, ICD-10 and [...]
Events on 2014-06-02
Events on 2014-06-12
Events on 2014-06-17
Events on 2014-06-20
Latest News

Industry Experts Advise DoD to Increase Cyber Oversight in Supply Chain

supply chain

Cybersecurity industry leaders, stakeholders and experts recommend the Department of Defense observe coordination with contractors regarding cyber issues more closely, Fifth Domain reported Wednesday. This recommendation comes to address the cyber vulnerabilities of the military’s supply chain.

In 2017, the federal government’s Defense Science Board said the supply chain’s complex structure creates openings for potential threats. The board noted that microelectronic parts and weapons move within the supply chain without formal protection plans, increasing the potential for vulnerabilities. Items moving in the chain undergo a number of different processes and thus become harder to track, the report noted.

Ray Gagne, director for acquisition program information protection with the U.S. Army, said that the military lacks oversight of activities in the subcontract level of defense programs.

“With the primes we have contractual understandings, but when they subcontract out, that is inherently a vulnerability,” he said.

He added that the military is working on an approach to protect technical data moving through the supply chain.

Source