The above JavaScript is a basic function. If your browser does not support JavaScript, if the webpage function is not working properly, please enable the JavaScript status of the browser. Go to the content anchor

LOGO

Supply Chain Security Threats Hunting

:::HOME / ENGINEERING & TECHNOLOGIES / Supply Chain Security Threats Hunting
Supply Chain Security Threats Hunting
  • Author(s)

    Ching-Hao Mao
  • Biography

    Dr. Ching-Hao Mao is the General Director, Cyber Trust Technology Institute (CTTI), Institute for Information Industry (III). He has great knowledge about data science, and six years of practical experience in cyber security. He was a visiting scholar at Carnegie Mellon University. His research interests are network security and graph mining, more specifically, learning and inferring from a graphical model for causal relations of malicious network behaviors. He has published over 30 international conference and journal papers. He was also the Showcased Honoree in the category of Information Security Practitioner of (ISC)² Asia-Pacific ISLA program in 2016.

  • Academy/University/Organization

    Institute for Information Industry
  • TAGS

  • Share this article

    You are free to share this article under the Attribution 4.0 International license

The 5G information security market is estimated to reach a compound growth rate of 44.25% in 2025. Its growth is driven by supply chain information security. The surge in vertical-oriented information security compliance and joint defense needs is guiding the development of innovative information security service models. The integration features cover information security information, information security services and information security maintenance, together with technically capable communities and schools, combined with the vertical field of information security product development and regional compliance requirements, and supply centered on information security analysis. Chain security threat hunting achieves security orchestration and automation response.


There are many successful information security innovations. Only supply chain information security has just started. The development of supply chain information security requires the matching of the industrial environment. Taiwanese companies are deeply involved in the global supply chain, which is an excellent hotbed of supply chain information security innovations. To deploy Security Orchestration Automation Response (SOAR), Managed service and Intelligence, and deploys supply chain information security platforms and services. The world has encountered the inability to quickly adapt to changes in cyber-attacks on information security, the detection of threats and returns are too slow, there is the lack of professional information security analysts and investigators, and supply chain information security to drive global information security business opportunities growth.

Artificial intelligence supply chain threat hunting technology includes a threat hunting correlation engine, active defense, and software detection. The threat hunting correlation engine uses the MITRE ATT&CK threat intelligence framework through AISecOps intent-oriented threat detection. Active defense components support 5G network element interfaces and industrial control information security protection requirements, automatically responds and slows down, and support software bill of materials (Software Bill of Material, SBOM) information security information. It is important to establish a global supply chain and a key information security ecosystem through three core components to create information security co-creation services, provide information security management of heterogeneous events, and provide second-line monitoring services with value-added intelligence and capital.

The information security suppliers master the degree of service autonomous technology and the ability to analyze and master the upstream intelligence and information. In addition to the existing SOC (Security Operations Center, SOC) operators in the information security operation part, the Network Operation Center or the Telecom Operation Support System will also develop towards the information security operation. In addition, the information security operation depends on the scale of the company and the type of industry. 5G has external compliance requirements, internal anti-hacking challenges, many heterogeneous devices and MEC (Multi-access Edge) computing architecture based on 5G private networks. The establishment of the information security industry ecological chain can lead to the creation of turn-key solutions for information security protection to drive the co-creation of architecture and open-source information security development.

In addition to the energy of information security technology, the key to future supply chain information security protection is the energy of information integration in the vertical field based on the customer patterns in existing fields. Information security threats have spread from the network layer to the application layer. E-commerce websites or databases are hacked, or information security threats derived from the failure of physical isolation in industrial control. In the 5G private network environment, it is necessary to integrate diverse and heterogeneous IT (Internet Technology, IT)/OT (Operational Technology, OT)/CT (Communication Technology, CT) devices by advanced supply chain threat detection and proactive threat hunting to establish an innovative service model based on supply chain information security.

RELATED

STAY CONNECTED. SUBSCRIBE TO OUR NEWSLETTER.

Add your information below to receive daily updates.