Experts in food defense and security will address a range of important issues in this area, including risk-based approaches to food defense, threat intelligence, cyber vulnerabilities and critical infrastructure protection.
The guide includes links to federal resources in food and agriculture, and case studies concerning food adulteration, IP theft and active shooter incidents that were carried about by insiders.
Cyber-physical attacks shift to industrial control systems across the supply chain.
Until food companies develop robust defense strategies to prevent cyberattacks, they will remain easy targets.
The ransomware attack likely originated from an organization in Russia.
This year’s Food Safety Consortium Virtual Conference Series kicked off with a discussion of food defense foundational planning.
Technology plays a key role in facilitating ongoing coordination between human resources and security that bolsters food defense in a COVID-19 world.
In the third installment of this series, we review lessons 14–19 that we learned following more than 30 food defense vulnerability and risk assessments conducted in accordance with FSMA’s IA rule.
In the second installment of this series, we review lessons 6–13 that we learned following more than 30 food defense vulnerability and risk assessments conducted in accordance with FSMA’s IA rule.
After conducting more than 30 food defense vulnerability and risk assessments in accordance with the FSMA Intentional Adulteration rule, here’s what we learned.