This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Robert Norton, Ph.D. is a Professor and National Security Liaison in the Office of the Vice President of Research and Economic Development at Auburn University. He specializes in national security matters and open-source intelligence, and coordinates research efforts related to food, agriculture, and veterinary defense.
The most important role of a Food and Agriculture Information Sharing and Analysis Center (FA-ISAC) is to facilitate the flow of information between industry and government entities
Information sharing is an important function for a Food and Agriculture Information Sharing and Analysis Center (FA-ISAC), which links business and government through "active collaboration," thereby strengthening the ability of the food and agriculture industries to withstand challenges and threats.
While ransomware is the most common cyberattack vector for businesses, other cyber threats can be far more dangerous to the food supply system, as discussed in this article.
Threat information should be disseminated as rapidly as possible, and is encouraged between businesses that may otherwise be restricted by anti-competitive laws or regulations
Threat information should be disseminated as rapidly as possible, especially between businesses that may otherwise be restricted by anti-competitive laws or regulations. This article discusses the nature of the information that should be and is typically shared by businesses participating in an Information Sharing and Analysis Center (ISAC).
With security threats against the sector increasing and cyber threats against the global supply system also on the rise, it is imperative that a food and agriculture ISAC be formed. It does not have to be fully capable at the start; just a few large companies that agree to pool and analyze threat information can plant the initial seed. If successful awareness and deterrence can be demonstrated, then other companies will join. At full capability, the ISAC can serve as a watch and warning center for the sector, providing timely threat analysis for members at all levels. In this article, the authors look at what it takes to create and run a successful ISAC.
An increasingly critical element of food safety and defense planning is assurance of data integrity—the ability to keep data unchanged as it is communicated or stored. Information that is used for decision-making or reporting cannot be compromised, altered, or manipulated by unauthorized users. Threat information is best shared through the establishment and voluntary participation of an Information Sharing and Analysis Center (ISAC). Food and agriculture is the only sector that lacks an ISAC. With security threats against the sector increasing and cyber threats against the global supply system also on the rise, it is imperative that a food and agriculture ISAC be formed.
Cyber is the backbone for food and agriculture defense. Adversaries have the means, opportunity, and motivation to break the cyber backbone at will. If or when adversaries carry out an attack of large magnitude, the result could be a massive compromise of food safety, food defenses, and food security. To avoid that dark scenario, agriculture and food companies must properly prepare for a different kind of assault. The place to start is with their own cyber defense systems.
The COVID-19 pandemic dramatically disrupted the food supply. This article seeks to explain the transcendent lessons of this national emergency, with the hope that being aware of them will help national decision-makers better prepare for next time. Our food systems, like the larger supply chain, will be challenged in the future with new kinds of disruptions, making it essential that mistakes are not repeated and that proactive, correct solutions are discovered and preparations made now.
Food safety and food defense are two sides of the same coin. One cannot exist without the other, ultimately meaning that if one is compromised, so too is the other.
Is coronavirus transmission by food or food packaging a valid concern? Here’s what we know and what we should be doing in the current absence of clear causality.