Building a secure and resilient supply chain

Are you gambling with your supply network? You should be aware that the supply network is inherently vulnerable to disruption and the failure of any one element in it could cause the whole network to fail.  Current trends call for a supply network design that is both secure and resilient; that means a supply network that has advanced security processes and procedures in place, while at the same time being resilient enough to respond to unexpected disruptions and restore normal supply network operations.

In their article, “Building a secure and resilient supply chain“, James B. Rice and Federico Caniato point at a number of actions and responses to achieve supply chain resilience.

Security versus Resilience

A first step in creating a supply network that is both secure and resilient is to recognize that the two are not the same. This distinction becomes important when developing plans focuses on security and resilience respectively.



Actions to improve security can be classified into three categories:
– Physical security
– Information security
– Freight security

Actions to improve resilience can be be divided into
– Flexibility
– Redundancy

Flexibility

An important distinction between flexibility and redundancy is that the latter involves capacity that may or may not be used; it is this additional capacity that would be used to replace the capacity loss caused by a disruption. Flexibility, on the other hand, entails redeploying previously committed capacity.

The following table illustrates the advantages and disadvantages of actions in relation to
– Supply
– Transportation
– Production Facilities
– Communications
– Human Resources

Supply_chain_resilience

Reference

Rice, J.B. and Caniato, F. (2003) Building a Secure and Resilient Supply Network. Supply Chain Management Review, Vol. 7, No. 5, pp. 22-30

Author links

Related

Posted in ARTICLES and PAPERS
Tags: , , , , , , ,

ARTICLES and PAPERS
Seconds From Disaster
Accidents don't just happen. They are a chain of critical events leading up to the disaster. Everyon[...]
Risk versus vulnerability
What is risk, and what is vulnerability? While connected, they are not the same, and perhaps, often [...]
BOOKS and BOOK CHAPTERS
Book Review: Operations Rules
Operations Rules by David Simchi-Levi comes with an ambiguous title. You can read this two ways: 1) [...]
Book review: Networks and Algorithms
If you are into network analysis of any kind, this book teaches you the basics. As the name implies,[...]
REPORTS and WHITEPAPERS
Global Risks 2009 - Countries at risk?
How will the current financial downturn affect supply chains? That's what we all wonder about, isn't[...]
America’s Crumbling Infrastructure
My daily morning routine includes a cup of coffee while watching the World Business Report on BBC Wo[...]