Supply Chain Security

SAIC helps government and industry achieve cyber supply chain security by fusing together the fields of cybersecurity and supply chain risk management. SAIC security consultants can help your organization guide best practices to software source planning, integration, and secure product life-cycle logistics management.


Overview

At SAIC, we create market leading solutions that assist users' and providers' organizational and process-level interactions as they plan, build, manage, maintain, and defend cyber infrastructure. We believe it is important to address the needs of the entire set of key actors involved with and using cyber infrastructure: system end-users, policy makers, acquisition specialists, system integrators, network providers, and software and hardware suppliers.

Real-World Assessment Experience

We guide tailored solutions that are based on our real-world experience. SAIC assesses and certifies hundreds of IT security products under the Common Criteria and Federal Information Processing Standard schemes. These schemes evaluate supply chain security as part of their requirement. We understand what it takes to address the demand for defense-in-depth within the system development life cycle (SDLC) along with defense-in-breadth across the cyber supply chain.

A Recognized Product-Independent Leader in IT security

SAIC can help whether you are addressing supply chain challenges internally or managing outsourced suppliers and final secure installation at the client site. We also understand the third party commercial processes, systems, and technology that can be applied to ensure product supply chain security and maintain it over time.

Our approach examines all aspects of product supply chain logistics, identifies and quantifies risk, and offers our clients cost-effective, business-oriented solutions from a recognized product-independent leader in IT security. SAIC offers:

  • Assessment — We audit, analyze, and assess the existing supply chain logistic risk in the current process applied, including the outsourcing of source code services.
  • Remediation — We provided clients with cost effective, business friendly supply chain strategies and solutions recognized as best practices by industry, the Federal Government, and the U.S. Department of Defense (DoD).
  • Maintenance — We help clients maintain the supply chain life-cycle across their enterprise to ensure continuous, sustainable product reliability.
  • Training — We offer a variety of supply chain training that includes best practices, data protection strategies, and risk management.

Additional Information

The following resources provide additional background on the topic of supply chain security.

Drawing of the Supply Chain Assurance Reference Model

White Paper: Cyber
Supply Chain Assurance Reference Model

Global cyber supply chains today are as fragmented as physical supply chains used to be. This paper outlines an innovative model that applies end-to-end supply chain management to cyber security for the first time.

Contact Us

For more information about our business solutions and capabilities, please contact us today.



© Science Applications International Corporation. All rights reserved. This page was printed from www.saic.com.