Secure production throughout the supply chain, from development to production to maintenance
Cyber-attacks targeting the manufacturing industry are on the rise, and combined with the advancement of digital transformation, security measures throughout the supply chain have become an urgent need.
In the complex interconnected supply network, it is essential to understand the differences between your company's business model and that of its partners, and to promote your company's security reforms while understanding the differences. This book introduces know-how as a guide.
Since it is not a good idea to aim for perfection right off the bat, the book is structured in such a way that you can move forward by taking concrete action, starting with the chapter ""Get the job done quickly"" which explains in an easy-to-understand manner methods that will have an immediate effect considering your position when you are assigned to carry out reforms.
Detailed explanations that answer questions such as more details and why are provided in the latter half of the book. The authors have also prepared a list of ""Several mistakes that should not be made"" based on their own experiences.
We hope that anyone who has been ordered to take security measures for their own company, factory, or department, or who has been assigned to security consulting work without field experience, will pick up this book and use it as a manual for quick, in-depth, and situation-specific understanding and reference.
We hope that this several-thousand-yen book will be worth as much as a several-million-yen consulting assignment for you in the field of reform, and tens of millions of yen for you as a consultant with little field experience.
Upon Publication
Section 1 Security is Important, Says the Boss
Section 2 Get the job done quickly
Section 3 The Partner on the supply network
Section 4 Cutting corners is fatal in Operations
Section 5 The Basics (read when you face difficulties)
Section 6 Practical Application: Creating a Factory-Based Security Organization
Section 7 How to proceed with factory security measures
Section 8 Several mistakes that should not be made
Section 9 Related Information
Glossary