Introduction critical chains of government and industry are no longer simple and visible sets of links from raw materials to manufacturers to acquirers immune to outside threats. Supply chains for information and communications technologies (ICT)-enabled components, like other critical chains, have become more complex and dynamic, making it imperative to assure that the products delivered for the component, system, and mission do what they are intended to do, and nothing else. U.S. Department of Defense (DoD) and others in the federal government view this growing threat to the critical ICT as an emerging national security issue that deserves more attention across the enterprise. Global ICT risk is a new aspect of cybersecurity identified as a priority in the Comprehensive National Cybersecurity Initiative (2009) as Initiative 11: Develop a multi-pronged approach to global risk management. Additionally, Initiative 8: Expand cyber education led to the creation of the National Initiative for Cybersecurity Education (NICE) (2009) and its National Cybersecurity Workforce Framework (2012) that defines specialty areas; knowledges, skills, and abilities (KSAs); and competencies. Global ICT risk cuts across many of the framework's specialty areas and the workforce requirements for ICT risk are found in the tasks, KSAs, and competencies of each specialty area. This paper frames the key elements of global ICT security and its importance to government as well as private sector companies. It also discusses the foundations of an education, training, and awareness (ETA) effort for the DoD workforce, where none currently exist. A is defined as the set of suppliers that contribute to the content of a product or system (both hardware and software) or that have the opportunity to modify its content (Ellison & Woody, 2010). Supply risk is the process for managing risk by identifying critical systems, processes, and components; vulnerabilities; and threats throughout the chain, and developing mitigation strategies to combat those threats. According to the U.S. National Strategy for Global Supply Chain Security (January 2012), global systems rely upon an interconnected web of transportation infrastructure and pathways, information technology, and cyber and energy networks (p. 2). The is now recognized as a major cyber threat affecting development and operation of computer systems and not just a threat to the transportation of material and goods from supplier to purchaser (Filsinger, Fast, Wolf, Payne, & Anderson, 2012, p. 9). Private sector companies are increasingly concerned about malicious tampering of software and hardware and counterfeits that lead to loss of their intellectual property, interfere with the successful performance of their products, and potentially damage their brands and reputations. term supply risk management was selected by policy makers to describe this new aspect of cybersecurity; however, the term has different meanings in other communities. term commonly applies to the efficiency and logistical aspects of the chain, not the integrity of ICT or the risks associated with its exploitation. For this new national cyber security concern, the ETA effort, and this paper, the topic is managing the taking of risks associated with global ICT exploitation with a focus on product integrity and its significance to the design, systems engineering, and sustainment phases of the system life cycle. Statement of the Problem: Responding to the Global ICT Supply Chain Security Threats Federal IT systems are increasingly at risk of both intentional and unintentional compromise due to the growing sophistication of information and communications technologies (ICT) and the growing speed and scale of a complex, distributed global chain (Boyens, Paulsen, Bartol, Moorthy, & Shankles, 2012, p. …