Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
28
29
30
31
1
2
3
5
6
7
8
9
10
13
14
15
16
17
18
12:00 AM - Epic UGM 2025
19
20
21
22
23
24
25
26
27
28
29
30
31
The 2025 DirectTrust Annual Conference
2025-08-04 - 2025-08-07    
12:00 am
Three of the most interesting healthcare topics are going to be featured at the DirectTrust Annual conference this year: Interoperability, Identity, and Cybersecurity. These are [...]
ALS Nexus Event Recap and Overview
2025-08-11 - 2025-08-14    
12:00 am
International Conference on Wearable Medical Devices and Sensors
2025-08-12    
12:00 am
Conference Details: International Conference on Wearable Medical Devices and Sensors , on 12th Aug 2025 at New York, New York, USA . The key intention [...]
Epic UGM 2025
2025-08-18 - 2025-08-21    
12:00 am
The largest gathering of Epic Users at the Epic user conference in Verona. Generally highlighted by Epic’s keynote where she often makes big announcements about [...]
Events on 2025-08-04
Events on 2025-08-11
Events on 2025-08-18
Epic UGM 2025
18 Aug 25
Verona
Latest News

Industry Experts Advise DoD to Increase Cyber Oversight in Supply Chain

supply chain

Cybersecurity industry leaders, stakeholders and experts recommend the Department of Defense observe coordination with contractors regarding cyber issues more closely, Fifth Domain reported Wednesday. This recommendation comes to address the cyber vulnerabilities of the military’s supply chain.

In 2017, the federal government’s Defense Science Board said the supply chain’s complex structure creates openings for potential threats. The board noted that microelectronic parts and weapons move within the supply chain without formal protection plans, increasing the potential for vulnerabilities. Items moving in the chain undergo a number of different processes and thus become harder to track, the report noted.

Ray Gagne, director for acquisition program information protection with the U.S. Army, said that the military lacks oversight of activities in the subcontract level of defense programs.

“With the primes we have contractual understandings, but when they subcontract out, that is inherently a vulnerability,” he said.

He added that the military is working on an approach to protect technical data moving through the supply chain.

Source