In today’s digital age, cybersecurity in procurement is more critical than ever. As supply chains become more interconnected, the risks associated with cyber threats continue to grow. Ensuring that sensitive procurement data remains protected and that suppliers uphold high cybersecurity standards is a key challenge for procurement professionals worldwide.
In this exclusive interview, Nadeem Arif, Senior Procurement Officer at the Department of Energy, Environment and Climate Action, shares his insights on how cybersecurity is embedded into procurement strategies. He discusses key measures for securing procurement systems, fostering supplier collaboration, mitigating third-party risks, and ensuring compliance with evolving cybersecurity standards.
With a proactive and structured approach, Nadeem emphasises that cybersecurity is not just a requirement—it’s a shared responsibility across the entire supply chain.
How do you ensure that suppliers adhere to cybersecurity standards?
A strong supplier evaluation process is the foundation for ensuring that suppliers meet cybersecurity standards. As part of supplier selection, I make cybersecurity compliance one of the key criteria and require vendors to provide evidence of certifications such as ISO 27001 or SOC 2.
To further enforce cybersecurity measures, I incorporate exclusive cybersecurity clauses in contracts, requiring compliance with data protection regulations and security audits. Additionally, I conduct periodic evaluations of suppliers’ cybersecurity practices using risk-based due diligence frameworks to mitigate potential threats.
Collaboration with IT and cybersecurity teams is crucial to ensuring that suppliers align with our organisation’s security policies. By promoting accountability and transparency, I ensure that cybersecurity remains a priority throughout the supply chain.
How has the rise of digital supply chains impacted your approach to cybersecurity?
The rise of digital supply chains has significantly changed my approach to cybersecurity, requiring a more integrated and proactive strategy. With the increasing adoption of emerging technologies such as cloud platforms, Internet of Things (IoT) devices, and artificial intelligence (AI) tools, the attack surface has expanded, exposing organisations to greater cyber risks.
To address these challenges, I now integrate cybersecurity at every stage of the procurement lifecycle, from supplier selection to contract management. I leverage advanced procurement systems and real-time tracking tools to monitor supply chain activities, allowing me to identify and address vulnerabilities promptly. Additionally, I only collaborate with suppliers that demonstrate a strong cybersecurity posture to ensure a secure supply chain ecosystem.
Other emerging technologies, such as blockchain, have also been explored to enhance data integrity and secure transactions. Ultimately, my approach ensures that efficiency gains from digital transformation do not come at the expense of security and resilience, aligning innovation with cybersecurity best practices.
How do you manage third-party risk related to cybersecurity breaches?
Managing third-party cyber risk requires a multi-layered approach. I start with detailed risk assessments during the onboarding process, evaluating a supplier’s security policies, incident response plans, and past breach history to gauge their cybersecurity resilience.
Cybersecurity obligations are made explicit in contracts, including penalties for noncompliance to reinforce accountability. Additionally, I implement continuous monitoring by leveraging advanced tools to assess supplier performance and identify potential vulnerabilities before they become risks.
Regular audits and penetration testing ensure ongoing compliance and strengthen cybersecurity measures. In the event of a breach, I work closely with suppliers to mitigate the impact, swiftly close vulnerabilities, and reinforce security measures to prevent recurrence.
What steps do you take to safeguard sensitive data in your procurement systems?
Securing sensitive data in procurement systems requires a combination of policies, technology, and training. I implement strong encryption and access controls across all procurement platforms and documents to ensure data integrity and confidentiality. Regular patches and security updates are applied by the IT team to prevent vulnerabilities and enhance system security.
Data is classified based on sensitivity, and only authorised personnel with the proper credentials can access procurement information. Multi-factor authentication (MFA) has also been implemented to prevent unauthorised access and strengthen system security.
Additionally, I share best practices for data protection with employees in the department, reinforcing a culture of cybersecurity awareness. I also work closely with IT teams to maintain robust incident response plans, ensuring we can react swiftly and effectively in the event of a data breach.
Collectively, these measures create a secure and resilient environment for sensitive procurement data.
.
How do you ensure cybersecurity is a shared priority with your suppliers?
Cybersecurity is a shared responsibility, and ensuring suppliers prioritise it requires collaboration and clear communication. I integrate cybersecurity requirements directly into supplier contracts, making it a non-negotiable aspect of our agreements.
To foster a collaborative approach, I organise training sessions and workshops to keep suppliers informed about emerging threats and best practices. Additionally, I share our organisation’s cybersecurity policies and encourage suppliers to adopt similar standards, reinforcing a culture of security across the supply chain.
Supplier evaluations include cybersecurity performance criteria, ensuring compliance and continuous improvement. This approach transforms cybersecurity from a contractual obligation into a mutual responsibility, strengthening our partnerships and safeguarding the entire supply chain.











