DoD Supply Chain Risk Management (SCRM) Taxonomy Curriculum

Subject: DoD Supply Chain Risk Management (SCRM) Taxonomy Curriculum

60 chapters

Chapters

  1. Supply Lines in the Power Game
    sitar cumbia, urdu electropop, havana cajun
    Explore how global supply chain vulnerabilities exposed by the 2020 crisis and great power competition have forced a strategic shift from just-in-time efficiency to just-in-case resilience in defense logistics. Learn why supply lines have become critical battlegrounds where communications disruptions and contested domains threaten national security infrastructure.
  2. Crosswalk the Changes
    ambient techno afroswing, afrobeat swing, grunge bedroom pop, psychedelic swing
    Learn how the Department of Defense responded to growing supply chain vulnerabilities in 2022 by developing a comprehensive risk management framework through collaborative stakeholder engagement.
  3. Flows That Guard What's At Stake
    algorave garage, piano country, anti-folk drumstep
    Defense supply chain fundamentals are broken down through the distinction between supply chains as networks and supply flows as activities, covering how inventory, maintenance, distribution, storage and transport interconnect to support military operations.
  4. Twelve Strong Pillars Hold the Frame
    sitar cumbia, urdu electropop, havana cajun
    Learn how the DoD's carefully crafted twelve-category taxonomy provides a balanced framework for supply chain risk management, with mutually exclusive categories designed to maintain clear thinking despite real-world overlaps.
  5. Twelve Domains of Supply Chain Thunder
    choral folk, afrobeat new jack swing
    Explore the twelve critical risk categories that defense organizations must monitor across global supply chains, from regulatory compliance and manufacturing vulnerabilities to cybersecurity threats and operational challenges.
  6. Dominoes Falling in the Rain
    algorave garage, piano country, anti-folk drumstep
    Supply chain vulnerabilities cascade through interconnected systems as natural disasters, political upheaval, and economic instability trigger far-reaching disruptions that can paralyze entire manufacturing networks. Listeners will discover how single events can create domino effects that expose critical weaknesses in global supply chain dependencies.
  7. When the Rules Start Changing Fast
    choral folk, afrobeat new jack swing
    Learn how rapidly evolving laws, regulations, and policies can destabilize supply chains by driving up costs, scaring away investors, and reshaping competitive markets overnight. Discover strategies for maintaining operational resilience when regulatory frameworks shift beneath your feet.
  8. Warning Signs and Hidden Lines
    sitar cumbia, urdu electropop, havana cajun
    Learn to identify critical red flags and misconduct patterns in defense contracting, from fraudulent billing and substandard materials to falsified records and regulatory violations. This essential training equips supply chain professionals with the knowledge to spot and address contractor misconduct before it compromises national security operations.
  9. Sam Dot Gov Blues
    ambient techno afroswing, afrobeat swing, grunge bedroom pop, psychedelic swing · 3:14
    Navigate the critical process of supplier risk assessment when contractors face exclusion challenges, learning to leverage SAM.gov for real-time compliance verification and systematic risk categorization. Master the DoD's structured approach to mid-contract disruptions through proper regulatory frameworks and decision-making protocols.
  10. Single Source Bottleneck Blues
    algorave garage, piano country, anti-folk drumstep · 2:43
    Learn how single supplier dependencies create critical vulnerabilities in defense supply chains, exploring capacity constraints, production delays, and market volatility that can disrupt mission-critical operations.
  11. Four Pillars Keep It Clean
    sitar cumbia, urdu electropop, havana cajun · 3:46
    Learn how to identify and mitigate supply chain vulnerabilities through the four foundational pillars of risk management, covering production capacity analysis, resource constraints, and facility auditing strategies. This comprehensive framework teaches defense supply chain professionals how to assess supplier capabilities and prevent critical breakdowns before they impact operations.
  12. Spread It On the Table Wide
    algorave garage, piano country, anti-folk drumstep · 3:38
    Learn how to systematically analyze Bills of Materials to identify and categorize supply chain vulnerabilities, from sole-source dependencies to obsolete components. This comprehensive risk mapping approach connects each component to specific taxonomy categories, enabling better visibility into manufacturing and supply chain threats.
  13. Hidden Ways and Foreign Sway
    algorave garage, piano country, anti-folk drumstep · 2:46
    Learn how foreign influence through direct control or covert means can compromise supply chain security by causing data leaks and standard failures in defense contractors. This examination reveals the critical vulnerabilities that emerge when companies fall under foreign sway and the resulting risks to sensitive information and operational integrity.
  14. Foreign Strings and Hidden Ties
    choral folk, afrobeat new jack swing · 4:05
    Explores how foreign government ownership and control of defense contractors creates security vulnerabilities, detailing the regulatory frameworks and oversight mechanisms used to identify and mitigate these supply chain risks.
  15. Hidden in the Corporate Maze
    dirty south, jungle · 2:51
    Supply chain security analysts learn to identify hidden foreign control within complex corporate structures by examining ownership patterns, voting rights, and management agreements that can obscure true decision-making power. The training reveals systematic methods for penetrating corporate mazes designed to disguise foreign influence over critical defense contractors.
  16. Powers That Fell, Supply Chains Hell
    algorave garage, piano country, anti-folk drumstep · 3:09
    Learn how political instability, weak governance, and geopolitical conflicts can devastate global supply chains and disrupt business operations. Discover the critical relationship between government effectiveness and supply chain resilience in an increasingly interconnected world.
  17. Supply Chains Face Uncertain Skies
    algorave garage, piano country, anti-folk drumstep · 2:41
    Military conflicts in regions like the Indo-Pacific and Black Sea create dangerous vulnerabilities in global supply chains, threatening access to critical components like semiconductors. Listeners will understand how geopolitical tensions and warfare directly disrupt the flow of essential military and civilian supplies.
  18. Geopolitical Storms Beyond
    choral folk, afrobeat new jack swing · 3:04
    Geopolitical tensions and conflicts can severely disrupt global supply chains, requiring organizations to map vulnerabilities and model potential impacts from regional crises affecting critical trade routes and energy supplies. Listeners will learn essential risk assessment techniques for anticipating and preparing for supply chain disruptions caused by international political instability.
  19. Data Flows Free
    ambient techno afroswing, afrobeat swing, grunge bedroom pop, psychedelic swing · 3:39
    Learn how Category One cybersecurity risks threaten modern supply chains through ICT vulnerabilities, from cyber-terrorism and malware to data theft and advanced persistent threats. This ambient techno exploration breaks down essential defense strategies for protecting software, networks, and hardware infrastructure.
  20. Threats That Never Sleep
    sitar cumbia, urdu electropop, havana cajun · 3:44
    Learn how software vulnerabilities and security flaws infiltrate Department of Defense supply chains through compromised code, open source components, and commercial off-the-shelf products. Discover essential cybersecurity tools like CVE databases, SBOM analysis, and vulnerability scanning techniques that help identify and mitigate these persistent digital threats.
  21. Knowledge Into Your Shield
    mandarin acid trance, koto boom bap · 4:39
    Discover how to leverage Software Bills of Materials (SBOMs) and DoD taxonomy frameworks to systematically assess and grade cybersecurity risks in your supply chain components. Learn the essential process of scanning, testing, and categorizing software vulnerabilities to build an effective defense strategy.
  22. Money Stress Breaking the Chain
    mandarin acid trance, koto boom bap · 3:22
    Learn how financial distress and cash flow problems can devastate suppliers and create dangerous vulnerabilities throughout the entire defense supply chain. This high-energy exploration reveals why supplier financial health is critical to maintaining secure and resilient military procurement operations.
  23. Warning Signs and Solid Ground
    dirty south, jungle · 3:07
    Learn to identify critical financial warning signs in your supply chain, from declining cash flows and credit ratings to bankruptcy risks, while discovering the six key categories of financial risk that can make or break your operations.
  24. Balance Sheets and Defense Beats
    algorave garage, piano country, anti-folk drumstep · 3:48
    Learn to analyze supplier financial health through key balance sheet metrics like liquidity ratios, debt-to-equity calculations, and quick ratios that reveal whether defense contractors can meet their obligations and maintain stable supply chains.
  25. Supply Chain Game Gone Wild
    dirty south, jungle · 3:23
    Economic instability wreaks havoc on supply chains as listeners explore how fluctuating employment, inflation, and financial uncertainty create cascading risks throughout defense procurement networks. This hard-hitting analysis reveals the interconnected vulnerabilities that emerge when macroeconomic forces spiral out of control.
  26. Seven Storms That Shake the Ground
    choral folk, afrobeat new jack swing · 3:59
    Learn how economic downturns, natural disasters, geopolitical conflicts, and four other major disruption categories create cascading effects throughout defense supply chains. This comprehensive overview examines the systemic vulnerabilities that can compromise military readiness when external forces shake the foundations of critical procurement networks.
  27. Ripple Effects Through Sun and Rain
    sitar cumbia, urdu electropop, havana cajun · 3:39
    Learn how economic shocks like inflation and rising energy costs cascade through multi-tier supply chains, as defense procurement professionals master techniques for modeling and calculating these complex ripple effects across vendor networks.
  28. Quality Failures in Disguise
    sitar cumbia, urdu electropop, havana cajun · 2:57
    Explores how substandard materials, compromised production processes, and neglected quality standards create hidden vulnerabilities throughout defense supply chains that can catastrophically undermine system reliability and mission readiness.
  29. Hidden Pain in the Chain
    dirty south, jungle · 2:46
    Counterfeit components infiltrate defense supply chains through deceptive practices like false identities and altered designs, while listeners discover how DFARS regulations and rigorous testing protocols serve as critical defenses against these costly security threats.
  30. Trace Each Clue
    ambient techno afroswing, afrobeat swing, grunge bedroom pop, psychedelic swing · 3:04
    Learn to identify and categorize supply chain threats through three hands-on exercises that teach counterfeit detection, data analysis, and systematic documentation using DoD taxonomy frameworks. Master the investigative techniques needed to trace suspicious components and build robust defense strategies against supply chain vulnerabilities.
  31. People Power Makes or Breaks the Line
    dirty south, jungle · 4:01
    Explore how human factors like skill gaps, workforce departures, and labor disputes create critical vulnerabilities in supply chain operations, learning to identify and mitigate people-powered risks that can bring entire systems to a halt.
  32. When the Pipeline Runs Dry
    mandarin acid trance, koto boom bap · 4:58
    Defense contractors confront a critical workforce shortage as skilled technicians, engineers, and cybersecurity professionals retire faster than new talent can be recruited and trained. Listeners will discover how the aging defense industry workforce and insufficient STEM pipeline create vulnerabilities in maintaining essential military capabilities and clearance requirements.
  33. 3 Applied Exercises
    sitar cumbia, urdu electropop, havana cajun · 3:09
    Three practical exercises demonstrate how to evaluate human capital vulnerabilities in defense supply chains, covering workforce stability analysis, skills gap assessment, and geographic risk concentration to identify potential mission-critical failures before they occur.
  34. Hidden Dangers in the Chain
    dirty south, jungle · 3:41
    Explores the various threats that can disrupt military supply chains, from natural disasters to human error, teaching listeners how to identify and prepare for vulnerabilities that could compromise critical defense operations.
  35. When the Earth Shakes Our Chains
    algorave garage, piano country, anti-folk drumstep · 2:34
    Natural disasters can devastate supply chains without warning, but geographic mapping and historical pattern analysis provide crucial tools for identifying vulnerable zones and building resilience. Learn how to leverage data-driven risk assessment to protect critical supply networks from earthquakes, tsunamis, hurricanes, and other environmental threats.
  36. Plot Your Bets and Map Disaster
    dirty south, jungle · 3:36
    Learn how to visualize and map your global supply chain vulnerabilities by plotting vendor locations against natural disaster risks to identify dangerous geographic concentrations that could cripple your entire operation.
  37. Seven Risks That Stop the Flow
    algorave garage, piano country, anti-folk drumstep · 3:04
    Learn about the seven critical transportation risks that can disrupt Department of Defense supply chains, from driver shortages and accidents to infrastructure damage that interrupts the flow of essential goods. This breakdown reveals how seemingly simple point-to-point logistics hide complex vulnerabilities that military procurement professionals must understand and mitigate.
  38. When the Grid Goes Down
    choral folk, afrobeat new jack swing · 4:09
    Learn how critical infrastructure vulnerabilities—from power grids to transportation networks—can create cascading failures that threaten entire supply chains and military operations. Discover the interconnected dependencies that make modern logistics systems fragile and understand why infrastructure resilience is essential for mission success.
  39. Chokepoints and Backup Plans
    mandarin acid trance, koto boom bap · 4:44
    Learn to identify and map critical vulnerabilities in defense supply chains, from transportation bottlenecks to backup contingency planning that keeps mission-critical components flowing when primary routes fail.
  40. Five Steps to Secure
    sitar cumbia, urdu electropop, havana cajun · 3:23
    Learn the essential five-step framework for integrating supply chain risk management into Department of Defense acquisition planning, from initial market research through contract award. This comprehensive guide covers vendor assessment, requirement development, and source selection criteria to strengthen your procurement security posture.
  41. Five Steps to Victory
    choral folk, afrobeat new jack swing · 3:26
    Learn the five essential steps of the DoD Supply Chain Risk Management framework that transforms scattered threats into manageable, structured solutions for protecting critical supply chains.
  42. Gates We Pass, Risks We Find
    sitar cumbia, urdu electropop, havana cajun · 3:17
    Explore the critical checkpoints throughout defense system lifecycles, from initial mission requirements through sustainment, learning to identify and assess supply chain vulnerabilities at each developmental gate.
  43. Six Tools Strong Defense Line
    ambient techno afroswing, afrobeat swing, grunge bedroom pop, psychedelic swing · 2:55
    Learn about the six critical cybersecurity tools that form a comprehensive defense strategy for protecting Department of Defense supply chains from invisible threats and vulnerabilities. Discover how AI-powered systems like SCREEn, SAM, GIDEP, and DIA TAC work together to digitize, track, and secure military procurement processes.
  44. Shine a Light on Hidden Nodes
    choral folk, afrobeat new jack swing · 2:47
    Supply chain professionals learn essential techniques for mapping multi-tier networks and identifying hidden vulnerabilities using illumination services and sub-tier analysis tools. The focus is on revealing upstream risks and scoring threats across complex global supply networks that often contain obscured nodes and dependencies.
  45. 3 Intelligence Products — Crystal Clear Defense Network
    mandarin acid trance, koto boom bap · 3:57
    Defense intelligence products and threat analysis committees work together to identify and mitigate hidden vulnerabilities in critical supply chain networks. Listeners will discover how classified assessments and specialized oversight committees create robust early warning systems against sophisticated supply chain attacks.
  46. Watch the Data Turn
    algorave garage, piano country, anti-folk drumstep · 2:31
    Learn to navigate critical DoD databases like SAM.gov and GIDEP through four hands-on exercises that teach you to identify vendor risks and component failure patterns. Master the essential data screening tools that form the backbone of military supply chain security assessment.
  47. Three-Tier Protection We Embrace
    dirty south, jungle · 3:10
    Learn how the NIST 861 revision 1 framework establishes three comprehensive protection levels for DoD supply chain security, from enterprise-wide strategy down to operational controls. Discover how Category 5 taxonomy aligns with cybersecurity objectives through clearly mapped control subcategories.
  48. 2 NIST SP 800-171 Rev 3 and the SCRM Family — PPP Triple Threat Protection
    mandarin acid trance, koto boom bap · 5:04
    Explore the newly added NIST 800-171 revision 3 supply chain risk management controls (03.17 family) and learn how these SCRM protections enhance cybersecurity frameworks. Discover the strategic importance of implementing comprehensive supply chain controls to mitigate risks across defense and commercial sectors.
  49. Flow Down the Line
    dirty south, jungle · 4:21
    Defense contractors navigate the cascading CMMC compliance requirements that flow from prime contractors down through every level of the supply chain, learning how security standards create binding obligations for all vendors working on government projects.
  50. Trust But Verify Every Time
    ambient techno afroswing, afrobeat swing, grunge bedroom pop, psychedelic swing · 2:37
    Learn how the Department of Defense categorizes supply chain components into four critical security levels, from basic to high-risk systems that require rigorous assessment before implementation. This essential framework helps military organizations systematically evaluate and protect their most vulnerable technological assets.
  51. Crosswalk the Framework Blues
    choral folk, afrobeat new jack swing · 3:24
    Learn how to systematically map NIST 800-161 security controls to the Department of Defense supply chain risk management taxonomy, establishing the foundational alignment between federal cybersecurity frameworks. Discover the methodical process of categorizing controls into administrative, technical, and physical zones while understanding how risk domains and subcategories interconnect.
  52. Third-Party Secrets Hide Away
    mandarin acid trance, koto boom bap · 4:49
    Explores the hidden risks lurking within commercial off-the-shelf (COTS) products and non-developmental items, revealing how third-party suppliers introduce vulnerabilities that organizations cannot easily detect or control unlike custom-built solutions.
  53. Code Hunters: Track the Supply Stack
    dirty south, jungle · 3:33
    Cybersecurity professionals learn to identify and catalog all software components, dependencies, and third-party libraries within systems using Software Bill of Materials (SBOM) requirements. This knowledge enables proper risk assessment and supply chain security management for Department of Defense systems.
  54. Silicon Dreams and Trusted Teams
    algorave garage, piano country, anti-folk drumstep · 3:00
    Learn how trusted foundries and DMEA oversight ensure the security and verification of microelectronics manufacturing in defense supply chains. Discover the critical role of silicon integrity in protecting national security through verified chip production processes.
  55. When the Market's Not So Clear — When the Market Goes Dark
    mandarin acid trance, koto boom bap · 4:26
    Defense contractors face critical supply chain vulnerabilities when original manufacturers disappear and systems enter sustainment phases, requiring strategic engineering solutions to maintain operational readiness. Listeners will understand how Diminishing Manufacturing Sources (DMS) threaten military systems and learn approaches for managing obsolescence risks in defense supply chains.
  56. Field to Capstone: Make It Real
    ambient techno afroswing, afrobeat swing, grunge bedroom pop, psychedelic swing · 3:09
    Learn how to apply DoD supply chain risk management principles through three hands-on exercises covering commercial off-the-shelf assessments, microchip tracing, and sustainment planning. This practical capstone transforms theoretical taxonomy knowledge into real-world implementation skills for defense supply chain professionals.
  57. Every Link Examined
    sitar cumbia, urdu electropop, havana cajun · 3:27
    Dive deep into the intricate web of defense supply chains, where weapon system components, supplier networks, and geopolitical factors converge to reveal critical vulnerabilities that could impact national security. Learn systematic approaches to mapping and analyzing every connection point in complex military procurement systems.
  58. Secrets That We Keep
    mandarin acid trance, koto boom bap · 4:34
    Defense contractors learn to identify and map the twelve critical vulnerability categories that threaten global supply chains, from initial sourcing through final deployment. This comprehensive risk assessment framework reveals how to systematically evaluate threats across every stage of the defense procurement process.
  59. Three Keys to the Chain
    sitar cumbia, urdu electropop, havana cajun · 2:54
    Learn the three essential criteria for effectively mapping and categorizing supply chain risks using the DoD's comprehensive 12-domain taxonomy system. Master the fundamental principles that ensure consistent and accurate risk identification across all threat categories in defense supply chain management.
  60. Spotlight on the Supply Chain
    sitar cumbia, urdu electropop, havana cajun · 3:23
    Students present their capstone research projects to expert panels, demonstrating mastery of supply chain risk taxonomy, mitigation strategies, and protective frameworks developed throughout their studies. Listeners experience the culmination of academic learning as future professionals showcase their ability to safeguard critical supply chain operations.