Discover how to strengthen your supply chain
Recap our webinar from 9th July 2025, strengthening your supply chain with military-informed risk success management. In a world where cyber threats and global disruptions are the new normal, supply chain strategies require more than resilience – they need military-grade protection.
With Gartner reporting that 50% of supply chain organisations plan to adopt Generative AI within the next year, now is the time to sharpen your approach with proven military principles.
Chris Starling, U.S. Marine Corps veteran and Assistant Vice President of NPower SkillBridge, and Alex Mortimer, Head of Business Development at Uniserve’s Supply Chain Academy & CEO of Safe Chain, delved into how military-informed risk management can transform your operations.
What was covered
- Tactical Risk Mitigation – Translate battlefield tactics, techniques & procedures – like decentralised command & control, immediate action drills, contingency planning, and redundancy to your organization. Make them part of your logistics playbook.
- Wargaming & Scenario Planning – Stress-test your systems the way military leaders prepare for conflict. Course of action development, branch & sequel planning, identifying critical vulnerabilities and gaps. Use red cells to understand most dangerous and most likely courses of action from adversaries.
- Warfighting Principles for business under siege – In times of chaos and unpredictability, military decision making processes and leadership principles are as applicable in the boardroom as on a battlefield. A warfighter mentality is critical to accomplishing the mission and protecting the force. In today’s high-stakes environment, you either make yourself too hard a target for your adversary – or you get drawn into the fight.
- Intelligence-Driven Agility – Intelligence drives operations. Leverage real-time data. Ensure reporting enables you to stay ahead of disruption.
- Cybersecurity as a Combat Zone – He who defends everything, defends nothing. Designate a main effort. Identify supported and supporting efforts. Reinforce your digital perimeter – because protecting your data is now a front-line mission.