As former director of operations at the U.S. Cyber Command, Brett Williams knows what it takes to protect our vulnerable supply chains. We asked him what companies can do to safeguard their data.
David Maloney has been a journalist for more than 35 years and is currently the group editorial director for DC Velocity and Supply Chain Quarterly magazines. In this role, he is responsible for the editorial content of both brands of Agile Business Media. Dave joined DC Velocity in April of 2004. Prior to that, he was a senior editor for Modern Materials Handling magazine. Dave also has extensive experience as a broadcast journalist. Before writing for supply chain publications, he was a journalist, television producer and director in Pittsburgh. Dave combines a background of reporting on logistics with his video production experience to bring new opportunities to DC Velocity readers, including web videos highlighting top distribution and logistics facilities, webcasts and other cross-media projects. He continues to live and work in the Pittsburgh area.
When Brett Williams was flying F-15 fighter jets for the U.S. Air Force, he never dreamed he would become one of the nation’s leading cybersecurity experts. But when you answer the nation’s call, you accept whatever mission you’re given. For him, it was becoming director of operations at the U.S. Cyber Command, a unified combatant command launched in 2010 to strengthen the Department of Defense’s (DOD) cyber capabilities and expertise. Maj. Gen. Williams ended up leading a team of 400 people responsible for the global operations and protection of all DOD computer networks as well as the planning and execution of authorized offensive operations.
During his time as an Air Force general officer, Williams served in significant senior executive leadership positions, including director of operations for the U.S. Air Force. He was also 18th Wing Commander in Okinawa, Japan, where he led the largest combat wing in the Air Force and oversaw a community of over 25,000 U.S. service members, their families, and Japanese employees. His 33-year Air Force career also included more than 100 combat missions as a F-15C fighter pilot.
Upon his retirement from the military in 2014, Williams moved into the business world, where he co-founded IronNet Cybersecurity. He is a recognized cybersecurity expert and sought-after speaker as well as a guest professor at his alma mater, Duke University, where he earned his B.S. in computer science. He also holds three graduate degrees in management and national security studies.
Williams was recently a guest on DC Velocity’s “Logistics Matters” podcast, where he spoke with Group Editorial Director David Maloney.
Q: How did you make the journey from military commander to cybersecurity expert?
A: I was in the Air Force for 33 years, 28 years as an F-15 pilot. Then I passed a highly selective screening process to move over to the IT and cyber world. I finished up at the U.S. Cyber Command and had broad responsibility for making sure Department of Defense networks were defended as well as planning offensive operations.
When I moved into this space about 12 years ago, I didn’t have any background in this field other than a 1981 computer science degree from Duke. But I put in the effort to develop a bit of technical expertise.
That’s something that I think is extremely important for business leaders to do. They can’t afford to delegate the risk decisions in the world of cybersecurity solely to the technical experts, whether they’re in-house experts or outside contractors. Leaders need to gain some relevant knowledge in this field so they can decide what is appropriate for their companies and what steps need to be taken. They need to be able to have an intelligent conversation with the providers of their cybersecurity services in the same way they do with everybody else on their leadership teams.
I encourage them all to spend a little time to get familiar with these issues so they can ask the right questions and make sure the answers they’re getting make sense to protect their businesses.
Q: We continue to hear about breaches of security systems, such as hacking and ransomware attacks. What are the biggest threats to our information systems right now, and where are they coming from?
A: There are two broad groups of threats out there. There are what we refer to as the “nation state threats,” and for the United States that continues to be China, Russia, North Korea, and Iran. And then there are the criminal groups.
I think the most important thing for people to keep in mind is that the worry is no longer about a teenager in his basement in a hoodie who is hacking for fun. Both the nation state threats and the criminal groups are well resourced and trained. They have vast expertise and tools, and they are deploying them broadly. I would argue that there is no company of any size in any sector that doesn’t have to consider the possibility that it could fall victim to a very advanced type of cyberattack.
Q: Along those lines, I think many companies feel that they’re too small to be threatened, that no one would bother to come after them. But the threat is real for everybody, correct?
A: That is 100 percent right and especially in the logistics and supply chain business. Every company that is part of that supply chain is a potential target.
Maybe you just supply some software that helps people manage inventory or maybe you’re a very large trucking or rail company that coordinates deliveries all over the country or the world—no matter how big or small your company is, you have a critical role in the supply chain that supports both our national economy and our national security. The people who are threats know that smaller companies are the least well defended, even though they are frequently a critical cog in this supply chain.
So, the first thing I would ask folks to consider is that you have a role in our national security. I would argue that your ability to make supply chains work and not bring risk is a national security issue, and I ask you to take it seriously.
Q: In what ways are our supply chains under threat?
A: The first thing to understand is that Covid brought the term “supply chain” into the vernacular and made people aware that disruptions to the supply chain are serious issues—including those who would seek to cause us harm, particularly those nation state threats I talked about. They know that if they can interrupt these national supply chains that impact our economy, our security, and our ability to “do” logistics, they can cause significant internal friction and really set us back on our heels.
Looking at the supply chain from a more tactical perspective, what you have to think about is that none of these companies operates alone. You have a supply chain that you rely on to make your business run, and, more than likely, you are part of a supply chain that makes another business run. So, as you look at your supply chain, you have to take it very seriously, particularly when you are sharing data or giving someone—such as a 3PL partner—access to your systems. What kind of security are those partners maintaining? How do you know if they are protecting your interests?
At the same time, you have a responsibility to do the same when you are providing services to another company. How are you protecting that data and ensuring you don’t become the security risk for that other company? You don’t want to bring risk to their operation, and there can be significant liability concerns if you somehow expose data or interrupt the operations of that company.
Q: If threats to our supply chains are a matter of national security, what are the potential costs to our country if our supply chains are severely disrupted?
A: Our adversaries are not going to attack us in physical space—say, in the South China Sea or someplace. They are first going to come to the homeland, if you will, and try to disrupt supply chains that maybe affect health care, or finance, or the delivery of critical goods and services. Or maybe they just get in and mess up things like our air traffic control system or the systems that control trucking around the country.
All of those have the effect of getting us to focus internally. They become political issues very quickly in our country, and the more we focus internally, the less we focus on those [actual] threats. That cultural issue to me is huge.
Then there are the real issues of not getting things to the places they need to be. That affects our economic system, which affects our national security. It is hard to think of anything that’s much more important than the supply chains that your [readers] support.
Q: Can you share some examples of how critical systems have been breached and the results of those breaches?
A: There was the attack called NotPetya that targeted Maersk, the giant global shipping agency. The total damages literally ran into the billions of dollars, and certainly Maersk wasn’t the only [company] that bore that cost, right? There were a lot of people relying on them. That was a system that was breached initially through ransomware and extortion, and then was completely locked up, preventing them from doing business the way they normally do it. We saw how quickly that cascaded through the global supply chain.
Another example was the ransomware attack on Colonial Pipeline. That one essentially targeted the company’s distribution and billing system. Colonial Pipeline could continue to move oil safely through the pipeline, but it couldn’t track how much went where.
About 25% of attacks in this sector of the economy are these types of ransomware attacks. So, make sure you practice good basic hygiene in your systems to protect them against ransomware. You can make yourself a slightly less attractive target than the next guy through basic security practices.
Q: What specifically should supply chain managers do to secure their systems and their supply chains against cyberattacks?
A: There are three quick things they should do. First, they need to identify their critical data. What data if it were exposed, manipulated, or destroyed and which system if it went down would have the biggest impact on their business? They have to prioritize their efforts to protect that data and those systems.
The second is to bolster password security by requiring two-factor authentication. The things people get very bored hearing about are nonetheless extremely important for basic security.
Then, number three, be very strict about identifying who will have access to your systems and have multiple ways to authenticate who they are and ensure that only authorized people are in those systems.
Then make certain that you have good backups for all your critical data and systems. These backups have to be done correctly. They can’t be connected to your normal system every day, because when the bad guys get into the system, they immediately look for a backup and then corrupt that as well. So, you really have to do backups and be careful about how they are managed.
Then, whether you outsource this work or handle it internally, if you are the business leader in the company, don’t delegate the risk decisions. In other words, you don’t have to be the technical expert, but you do have to know enough about it to make sure that you’re mitigating the risk that is relevant to your company. Understand the investment you are making and what the payoff is. Understand the basic terms and concepts. I encourage you to get smart, ask questions, and make sure you fully understand how your systems are protected from cyberattacks.
Supply chains are poised for accelerated adoption of mobile robots and drones as those technologies mature and companies focus on implementing artificial intelligence (AI) and automation across their logistics operations.
That’s according to data from Gartner’s Hype Cycle for Mobile Robots and Drones, released this week. The report shows that several mobile robotics technologies will mature over the next two to five years, and also identifies breakthrough and rising technologies set to have an impact further out.
Gartner’s Hype Cycle is a graphical depiction of a common pattern that arises with each new technology or innovation through five phases of maturity and adoption. Chief supply chain officers can use the research to find robotic solutions that meet their needs, according to Gartner.
Gartner, Inc.
The mobile robotic technologies set to mature over the next two to five years are: collaborative in-aisle picking robots, light-cargo delivery robots, autonomous mobile robots (AMRs) for transport, mobile robotic goods-to-person systems, and robotic cube storage systems.
“As organizations look to further improve logistic operations, support automation and augment humans in various jobs, supply chain leaders have turned to mobile robots to support their strategy,” Dwight Klappich, VP analyst and Gartner fellow with the Gartner Supply Chain practice, said in a statement announcing the findings. “Mobile robots are continuing to evolve, becoming more powerful and practical, thus paving the way for continued technology innovation.”
Technologies that are on the rise include autonomous data collection and inspection technologies, which are expected to deliver benefits over the next five to 10 years. These include solutions like indoor-flying drones, which utilize AI-enabled vision or RFID to help with time-consuming inventory management, inspection, and surveillance tasks. The technology can also alleviate safety concerns that arise in warehouses, such as workers counting inventory in hard-to-reach places.
“Automating labor-intensive tasks can provide notable benefits,” Klappich said. “With AI capabilities increasingly embedded in mobile robots and drones, the potential to function unaided and adapt to environments will make it possible to support a growing number of use cases.”
Humanoid robots—which resemble the human body in shape—are among the technologies in the breakthrough stage, meaning that they are expected to have a transformational effect on supply chains, but their mainstream adoption could take 10 years or more.
“For supply chains with high-volume and predictable processes, humanoid robots have the potential to enhance or supplement the supply chain workforce,” Klappich also said. “However, while the pace of innovation is encouraging, the industry is years away from general-purpose humanoid robots being used in more complex retail and industrial environments.”
An eight-year veteran of the Georgia company, Hakala will begin his new role on January 1, when the current CEO, Tero Peltomäki, will retire after a long and noteworthy career, continuing as a member of the board of directors, Cimcorp said.
According to Hakala, automation is an inevitable course in Cimcorp’s core sectors, and the company’s end-to-end capabilities will be crucial for clients’ success. In the past, both the tire and grocery retail industries have automated individual machines and parts of their operations. In recent years, automation has spread throughout the facilities, as companies want to be able to see their entire operation with one look, utilize analytics, optimize processes, and lead with data.
“Cimcorp has always grown by starting small in the new business segments. We’ve created one solution first, and as we’ve gained more knowledge of our clients’ challenges, we have been able to expand,” Hakala said in a release. “In every phase, we aim to bring our experience to the table and even challenge the client’s initial perspective. We are interested in what our client does and how it could be done better and more efficiently.”
Although many shoppers will
return to physical stores this holiday season, online shopping remains a driving force behind peak-season shipping challenges, especially when it comes to the last mile. Consumers still want fast, free shipping if they can get it—without any delays or disruptions to their holiday deliveries.
One disruptor that gets a lot of headlines this time of year is package theft—committed by so-called “porch pirates.” These are thieves who snatch parcels from front stairs, side porches, and driveways in neighborhoods across the country. The problem adds up to billions of dollars in stolen merchandise each year—not to mention headaches for shippers, parcel delivery companies, and, of course, consumers.
Given the scope of the problem, it’s no wonder online shoppers are worried about it—especially during holiday season. In its annual report on package theft trends, released in October, the
security-focused research and product review firm Security.org found that:
17% of Americans had a package stolen in the past three months, with the typical stolen parcel worth about $50. Some 44% said they’d had a package taken at some point in their life.
Package thieves poached more than $8 billion in merchandise over the past year.
18% of adults said they’d had a package stolen that contained a gift for someone else.
Ahead of the holiday season, 88% of adults said they were worried about theft of online purchases, with more than a quarter saying they were “extremely” or “very” concerned.
But it doesn’t have to be that way. There are some low-tech steps consumers can take to help guard against porch piracy along with some high-tech logistics-focused innovations in the pipeline that can protect deliveries in the last mile. First, some common-sense advice on avoiding package theft from the Security.org research:
Install a doorbell camera, which is a relatively low-cost deterrent.
Bring packages inside promptly or arrange to have them delivered to a secure location if no one will be at home.
Consider using click-and-collect options when possible.
If the retailer allows you to specify delivery-time windows, consider doing so to avoid having packages sit outside for extended periods.
These steps may sound basic, but they are by no means a given: Fewer than half of Americans consider the timing of deliveries, less than a third have a doorbell camera, and nearly one-fifth take no precautions to prevent package theft, according to the research.
Tech vendors are stepping up to help. One example is
Arrive AI, which develops smart mailboxes for last-mile delivery and pickup. The company says its Mailbox-as-a-Service (MaaS) platform will revolutionize the last mile by building a network of parcel-storage boxes that can be accessed by people, drones, or robots. In a nutshell: Packages are placed into a weatherproof box via drone, robot, driverless carrier, or traditional delivery method—and no one other than the rightful owner can access it.
Although the platform is still in development, the company already offers solutions for business clients looking to secure high-value deliveries and sensitive shipments. The health-care industry is one example: Arrive AI offers secure drone delivery of medical supplies, prescriptions, lab samples, and the like to hospitals and other health-care facilities. The platform provides real-time tracking, chain-of-custody controls, and theft-prevention features. Arrive is conducting short-term deployments between logistics companies and health-care partners now, according to a company spokesperson.
The MaaS solution has a pretty high cool factor. And the common-sense best practices just seem like solid advice. Maybe combining both is the key to a more secure last mile—during peak shipping season and throughout the year as well.
The Boston-based enterprise software vendor Board has acquired the California company Prevedere, a provider of predictive planning technology, saying the move will integrate internal performance metrics with external economic intelligence.
According to Board, the combined technologies will integrate millions of external data points—ranging from macroeconomic indicators to AI-driven predictive models—to help companies build predictive models for critical planning needs, cutting costs by reducing inventory excess and optimizing logistics in response to global trade dynamics.
That is particularly valuable in today’s rapidly changing markets, where companies face evolving customer preferences and economic shifts, the company said. “Our customers spend significant time analyzing internal data but often lack visibility into how external factors might impact their planning,” Jeff Casale, CEO of Board, said in a release. “By integrating Prevedere, we eliminate those blind spots, equipping executives with a complete view of their operating environment. This empowers them to respond dynamically to market changes and make informed decisions that drive competitive advantage.”
Material handling automation provider Vecna Robotics today named Karl Iagnemma as its new CEO and announced $14.5 million in additional funding from existing investors, the Waltham, Massachusetts firm said.
The fresh funding is earmarked to accelerate technology and product enhancements to address the automation needs of operators in automotive, general manufacturing, and high-volume warehousing.
Iagnemma comes to the company after roles as an MIT researcher and inventor, and with leadership titles including co-founder and CEO of autonomous vehicle technology company nuTonomy. The tier 1 supplier Aptiv acquired Aptiv in 2017 for $450 million, and named Iagnemma as founding CEO of Motional, its $4 billion robotaxi joint venture with automaker Hyundai Motor Group.
“Automation in logistics today is similar to the current state of robotaxis, in that there is a massive market opportunity but little market penetration,” Iagnemma said in a release. “I join Vecna Robotics at an inflection point in the material handling market, where operators are poised to adopt automation at scale. Vecna is uniquely positioned to shape the market with state-of-the-art technology and products that are easy to purchase, deploy, and operate reliably across many different workflows.”