Return to Home PageISACA Logo at top of page
  • Credentialing
  • Membership
  • Enterprise
  • PARTNERSHIPS
  • Training & Events
  • Resources
  • Join
    • PROFESSIONAL JOIN
    • RECENT GRAD JOIN
    • STUDENT JOIN
  • About Us
    • ABOUT US HOME
    • WHO WE ARE
    • NEWSROOM
    • PARTICIPATE & VOLUNTEER
    • LEADERSHIP & GOVERNANCE
    • ADVOCACY
    • ISACA FOUNDATION
    • CONTACT US
    • CODE OF PROFESSIONAL ETHICS
  • CAREERS
    • Career Journey
    • Career Center
    • Careers at ISACA
  • SUPPORT
  • Store
    Total
    View Cart Checkout

    No items have been added to your cart yet

    Browse Search
  • Cart (0)
  • Sign In
  • MEMBERSHIP
  • CERTIFICATIONS
  • CERTIFICATES
  • CPE CERTIFICATES
  • Engage
  • LEARNING ACCESS
  • RESOURCES
  • ORDER HISTORY
  • Redeemable Products
  • Sign Out
  • Sign In
  • Create an Account
  • CERTIFICATIONS
    • CISA—Certified Information Systems Auditor
    • CISM—Certified Information Security Manager
    • CRISC—Certified in Risk and Information Systems Control
    • CDPSE—Certified Data Privacy Solutions Engineer
    • CCOA—Certified Cybersecurity Operations Analyst
    • AAIA—Advanced in AI Audit
    • AAISM—Advanced in AI Security Management
    • CGEIT—Certified in the Governance of Enterprise IT
    • CET—Certified in Emerging Technology Certification
    • ITCA—Information Technology Certified Associate
    • CSX-P—CSX Cybersecurity Practitioner Certification
  • CERTIFICATES
    • CCAK—Certificate in Cloud Auditing Knowledge
    • COBIT
      • COBIT 2019 Foundation
      • COBIT 2019 Design & Implementation
      • Implementing the NIST Cybersecurity Framework using COBIT 2019
      • COBIT 5 Certificates
    • Cybersecurity Audit
    • Cybersecurity Fundamentals
    • Digital Trust Ecosystem Framework Foundation Certificate
    • Emerging Technology
      • AI Fundamentals
      • Blockchain Fundamentals
      • Cloud Fundamentals
      • IoT Fundamentals
    • Information Technology
      • Computing Fundamentals
      • Data Science Fundamentals
      • Networks and Infrastructure Fundamentals
      • Software Development Fundamentals
    • IT Audit Fundamentals
    • IT Risk Fundamentals
  • WHICH CERTIFICATION IS RIGHT FOR YOU?
  • VERIFY A CERTIFICATION
  • DIGITAL BADGES
  • RENEW OR MAINTAIN A CERTIFICATION
  • Career Journey
  • Which Exam Prep is Right for You?
  • TRAIN YOUR WAY WITH OFFICIAL ISACA EXAM PREP
  • BUILD YOUR TEAM'S PERFORMANCE WITH CUSTOMIZED TRAINING
  • BECOME A MEMBER
    • Browse Chapters
    • Find Your Membership Type
    • Member Benefits
  • ENGAGE ONLINE COMMUNITY
  • GET INVOLVED
    • Advocacy
    • Author an Article
    • Chapter Events Calendar
    • ISACA Awards
    • SheLeadsTech
    • Speak at Conferences
    • Volunteer
  • MAXIMIZE YOUR MEMBERSHIP
    • Career Center
    • Discounts & Savings
    • Free CPE
    • Free Resource Previews
    • Member-Exclusive Leadership Series
    • Mentorship
  • Personalize Your Experience
  • UPDATE YOUR PROFILE
  • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
    • CMMI Performance Solutions
    • CMMI Cybermaturity Platform
    • Voluntary Improvement Program
  • TEAM TRAINING
    • Skills & Credentials
    • CMMI Training
  • CMMI APPRAISALS (PARS)
  • ENTERPRISE SUPPORT
  • CONTACT US
  • Empower Your Team to Power Business Growth
  • CUSTOMIZE YOUR IT TEAM TRAINING
  • BECOME A TRAINING PARTNER
  • BECOME A CMMI PARTNER
  • BECOME AN ACADEMIC OR WORKFORCE PARTNER
  • Sponsorship
    • Become a Sponsor
    • Global Sponsors
  • FIND A TRAINING PARTNER
    • Certification Training Partners
      • Certification Training Partners
      • Americas
      • Asia and Oceania
      • China
      • EMEA
    • COBIT Training Partners
    • Academic & Workforce Partners
    • CMMI Performance Improvement Partners
  • Over 100,000 People Were Trained by ISACA in 2022
  • BECOME A PARTNER TO CAPITALIZE ON THIS HIGH DEMAND
  • CONFERENCES
    • GRC Conference
    • ISACA Europe Conference
    • ISACA North America Conference
    • ISACA Virtual Conference
    • Student Summit
    • Call for Speakers
  • CHAPTER EVENTS
  • Training Week
  • Virtual Workshops
  • TRAINING BY TYPE
    • Online Review Courses
    • Session Recordings
    • Webinars
    • Virtual Summits
  • GROUP/ENTERPRISE TRAINING
  • TRAINING FROM AN ACCREDITED PARTNER
  • TRAINING BY TOPIC
    • All Training Topics
    • Artificial Intelligence
    • Cybersecurity
    • IT Audit
    • Certification Exam Preparation
    • COBIT
  • On-Demand CPE Training
  • September Featured Training:
  • 15% OFF THE CCOA ONLINE COURSE
  • DIGITAL TRUST
  • ISACA JOURNAL
  • INSIGHTS & EXPERTISE
  • NEWS & TRENDS
  • ENGAGE ONLINE COMMUNITIES
  • COBIT
  • RESOURCES BY TOPIC
    • Artificial Intelligence
    • Cybersecurity
    • Emerging Technology
    • Governance
    • IT Audit
    • IT Risk
    • Privacy
  • FRAMEWORKS, STANDARDS AND MODELS
  • ISACA NOW BLOG
  • ISACA VIDEOS
  • ISACA PODCAST
  • GLOSSARY
  • Announcing ISACA’s Digital Trust Ecosystem Framework and Portfolio
  • Advance Digital Trust
  • Credentialing
    • CREDENTIALING
    • CERTIFICATES
      • CERTIFICATES
      • CCAK—Certificate in Cloud Auditing Knowledge
      • COBIT
        • COBIT 2019 Foundation
        • COBIT 2019 Design & Implementation
        • Implementing the NIST Cybersecurity Framework using COBIT 2019
        • COBIT 5 Certificates
      • Cybersecurity Audit
      • Cybersecurity Fundamentals
      • Digital Trust Ecosystem Framework Foundation Certificate
      • Emerging Technology
        • AI Fundamentals
        • Blockchain Fundamentals
        • Cloud Fundamentals
        • IoT Fundamentals
      • Information Technology
        • Computing Fundamentals
        • Data Science Fundamentals
        • Networks and Infrastructure Fundamentals
        • Software Development Fundamentals
      • IT Audit Fundamentals
      • IT Risk Fundamentals
    • WHICH CERTIFICATION IS RIGHT FOR YOU?
    • VERIFY A CERTIFICATION
    • CERTIFICATIONS
      • CERTIFICATIONS
      • CISA—Certified Information Systems Auditor
      • CISM—Certified Information Security Manager
      • CRISC—Certified in Risk and Information Systems Control
      • CDPSE—Certified Data Privacy Solutions Engineer
      • CCOA—Certified Cybersecurity Operations Analyst
      • AAIA—Advanced in AI Audit
      • AAISM—Advanced in AI Security Management
      • CGEIT—Certified in the Governance of Enterprise IT
      • CET—Certified in Emerging Technology Certification
      • ITCA—Information Technology Certified Associate
      • CSX-P—CSX Cybersecurity Practitioner Certification
    • DIGITAL BADGES
    • TRAIN YOUR WAY WITH OFFICIAL ISACA EXAM PREP
    • BUILD YOUR TEAM'S PERFORMANCE WITH CUSTOMIZED TRAINING
    • RENEW OR MAINTAIN A CERTIFICATION
    • Career Journey
  • Membership
    • MEMBERSHIP
    • BECOME A MEMBER
      • BECOME A MEMBER
      • Browse Chapters
      • Find Your Membership Type
      • Member Benefits
    • ENGAGE ONLINE COMMUNITY
    • MAXIMIZE YOUR MEMBERSHIP
      • MAXIMIZE YOUR MEMBERSHIP
      • Career Center
      • Discounts & Savings
      • Free CPE
      • Free Resource Previews
      • Member-Exclusive Leadership Series
      • Mentorship
    • UPDATE YOUR PROFILE
    • GET INVOLVED
      • GET INVOLVED
      • Advocacy
      • Author an Article
      • Chapter Events Calendar
      • ISACA Awards
      • SheLeadsTech
      • Speak at Conferences
      • Volunteer
  • Enterprise
    • ENTERPRISE
    • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
      • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
      • CMMI Performance Solutions
      • CMMI Cybermaturity Platform
      • Voluntary Improvement Program
    • CUSTOMIZE YOUR IT TEAM TRAINING
    • TEAM TRAINING
      • ENTERPRISE TRAINING AND CREDENTIALS
      • Skills & Credentials
      • CMMI Training
    • CMMI APPRAISALS (PARS)
    • ENTERPRISE SUPPORT
    • CONTACT US
  • PARTNERSHIPS
    • PARTNERSHIPS
    • BECOME A TRAINING PARTNER
    • BECOME A CMMI PARTNER
    • BECOME AN ACADEMIC OR WORKFORCE PARTNER
    • Sponsorship
      • Become a Sponsor
      • Global Sponsors
    • FIND A TRAINING PARTNER
      • FIND A TRAINING PARTNER
      • Certification Training Partners
        • Certification Training Partners
        • Americas
        • Asia and Oceania
        • China
        • EMEA
      • COBIT Training Partners
      • Academic & Workforce Partners
      • CMMI Performance Improvement Partners
    • BECOME A PARTNER TO CAPITALIZE ON THIS HIGH DEMAND
  • Training & Events
    • TRAINING AND EVENTS
    • CONFERENCES
      • CONFERENCES
      • GRC Conference
      • ISACA Europe Conference
      • ISACA North America Conference
      • ISACA Virtual Conference
      • Student Summit
      • Call for Speakers
    • CHAPTER EVENTS
    • Training Week
    • Virtual Workshops
    • TRAINING BY TYPE
      • TRAINING BY TYPE
      • Online Review Courses
      • Session Recordings
      • Webinars
      • Virtual Summits
    • GROUP/ENTERPRISE TRAINING
    • TRAINING FROM AN ACCREDITED PARTNER
    • TRAINING BY TOPIC
      • Find Training by Topic
      • All Training Topics
      • Artificial Intelligence
      • Cybersecurity
      • IT Audit
      • Certification Exam Preparation
      • COBIT
    • On-Demand CPE Training
    • 15% OFF THE CCOA ONLINE COURSE
  • Resources
    • RESOURCES
    • DIGITAL TRUST
    • ISACA JOURNAL
    • INSIGHTS & EXPERTISE
    • NEWS & TRENDS
    • ENGAGE ONLINE COMMUNITIES
    • COBIT
    • RESOURCES BY TOPIC
      • Artificial Intelligence
      • Cybersecurity
      • Emerging Technology
      • Governance
      • IT Audit
      • IT Risk
      • Privacy
    • FRAMEWORKS, STANDARDS AND MODELS
    • ISACA NOW BLOG
    • ISACA VIDEOS
    • ISACA PODCAST
    • GLOSSARY
    • Advance Digital Trust
  • Join
    • PROFESSIONAL JOIN
    • RECENT GRAD JOIN
    • STUDENT JOIN
  • About Us
    • ABOUT US HOME
    • WHO WE ARE
    • NEWSROOM
    • PARTICIPATE & VOLUNTEER
    • LEADERSHIP & GOVERNANCE
    • ADVOCACY
    • ISACA FOUNDATION
    • CONTACT US
    • CODE OF PROFESSIONAL ETHICS
  • CAREERS
    • Career Journey
    • Career Center
    • Careers at ISACA
  • SUPPORT
  • Store
  • Cart
Sign In

Understanding Supply Chain Security Gaps

2022 Global Research

How VIP Helps Medical Device Manufacturers

Since the start of the COVID-19 pandemic, we’ve seen the impacts of supply chain fragility. But in addition to logistics and availability issues, security and governance issues can have a devastating effect on the supply chain as well. This global research featuring insights from more than 1,300 IT professionals with supply chain knowledge, looks at:

  • Overall confidence in the organization’s supply chain security
  • Top risks facing the supply chain
  • Supply chain attacks in the last 12 months
  • Governance and security measures needed
  • Outlook of improvement in the next six months

Download the free survey report to see how your organization compares and actions you should be taking now to implement stronger governance and security measures for your supply chain.

Access The Report

Related Resources

Supply Chain Security Gaps Infographic
Infographic

Supply Chain Security Gaps Infographic

View supply chain security survey highlights in this infographic.

6 June 2022
Mea Clift
Blog Post

Supply Chain Risk Management: Where Do We Start?

Mea Clift examines how to climb the mountain of evaluating vendors to ensure they're meeting security standards.

6 June 2022
Tech Pros Have Low Confidence in Supply Chain Security
Press Release

Tech Pros Have Low Confidence in Supply Chain Security, According to New Global Research From ISACA

More than half of respondents say supply chain issues will stay the same or worsen over the next six months.

6 June 2022
Supply Chain Resilience and Continuity
White Paper

Supply Chain Resilience and Continuity

With each major disaster we confront—including the current pandemic—business continuity management must continue to evolve. Learn how in our new white paper: Supply Chain Resilience and Continuity: Closing Gaps Exposed in a Global Pandemic.

John P. Pironti
@ISACA Article

Five Key Considerations for Improving IT Supply Chain Security

Most organizations have historically focused their information risk and security efforts on what they can control and often ignore their IT supply chains, which they can only influence.

13 April 2022
The Pitfalls of Supply Chain Risk Management
ISACA Journal Article

The Pitfalls of Supply Chain Risk Management

Many organizations have progressively increased their reliance on a growing number of global suppliers.

Author: David Podeswik
IN PURSUIT OF DIGITAL TRUST
Resource

ISACA - The Digital Trust Leader

ISACA is the Digital Trust leader in audit, governance, risk, and privacy.

  • LinkedIn
  • Facebook
  • Instagram
  • YouTube
  • Contact Us
  • Terms
  • Privacy
  • Cookie Notice
  • Cookie Settings
  • Fraud Reporting
  • Bug Reporting

1700 E. Golf Road, Suite 400, Schaumburg, Illinois 60173, USA  |  +1-847-660-5505  |  ©2025 ISACA. All rights reserved.