Discuss the supply chain risk in the cybersecurity industry

Assignment Help Management Information Sys
Reference no: EM131420207

Industry Profile : Supply Chain Risk in the Cybersecurity Industry

For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

1. Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:

a. Cyber Security Risks in Industrial Supply Chainshttps://www.securityweek.com/cyber-security-risks-industrial-supply-chains

b. Cybersecurity in the Supply Chain

https://www.lmi.org/CMSPages/getfile.aspx?nodeguid=adf22863-fca9-44ae-a93a-c20e21bae1e6&AspxAutoDetectCookieSupport=1

c. Cybersecurity Risks in the Supply Chain

https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf

d. Independent contractors, outsourcing providers and supply chain vendors: The weakest link in cybersecurity?

https://www.wiggin.com/files/30783_cybersecurity-update-winter-2015.pdf (pp. 2-3)

2. Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:

a. https://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf

b. https://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/

c. Cybersecurity: Five lessons learned the hard way

https://www.lexology.com/library/detail.aspx?g=e0e6d83f-3783-457a-8ce5-cda2ed9f3dcd

3. Research best practices and recommended strategies and approaches for managing global supply chain risk

a. 10 Supply Chain Risk Management Best Practices

https://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1

b. Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspace

https://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace

c. Managing Risk in Global ICT Supply Chains

https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf

d. Supply Chain Risk Management Awareness

https://www.afcea.org/committees/cyber/documents/Supplychain.pdf

Write

1. An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.

2. A supply chain riskssection in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.

3. A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.

4. A best practicessection in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.

5. A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.

Yourfive to eight pagepaper is to be prepared using basic APA formatting (including title page and reference list)and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples.Consult the grading rubric for specific content and formatting requirements for this assignment.

Reference no: EM131420207

Questions Cloud

Find the maximum metal removal rate during the cut : A face milling operation is performed to finish the top surface of a steel rectangular work piece 12.0 in long x 2.0 in wide. The milling cutter has four teeth (cemented carbide inserts) and a 3,0 in diameter.
Describe two ways you can incorporate coaching as training : As the clinic manager of the Berkeley College student-health center, you lead a team of eight nurses and nursing aides, many of whom are working their first health care job. Describe two ways you can incorporate coaching as a training and development..
Extensive investigation of the etruscans : The Mysterious Etruscans website provides an extensive investigation of the Etruscans and their contributions to Western culture. Among the topics examined are Etruscan art, history, religion, cities, lifestyles, and tombs.
Same path of revolution the conclusions : Why do you think that though Russia and France -the two nations went through the same path of Revolution the conclusions were different?
Discuss the supply chain risk in the cybersecurity industry : you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply ..
Determine the time to make one pass across the surface : A face milling operation is performed to finish the top surface of a steel rectangular work piece 12.0 in long x 2.0 in wide. The milling cutter has four teeth (cemented carbide inserts) and a 3,0 in diameter.
Taxi service is a new entrant to the taxi industry : Jake's Taxi Service is a new entrant to the taxi industry. It has achieve success by staking out a unique position in the industry. How did Jake's Taxi Service most likely achieve this position? Silver Screen Cinemas Inc. and Digi Now Inc. are two co..
How did the black consciousness movement : How did the black consciousness movement, led by Steve Bilko, become the most important factor in igniting the rebellious flames that swept the nation prior to, during, and after the Soweto uprising?
Discuss the application of speech recognition : Discuss why HCI is important and has evolved to ensure that the needs of different kinds of users are taken into account in computer systems. Discuss the application of speech recognition as a tool for Human Computer Interaction

Reviews

Write a Review

Management Information Sys Questions & Answers

  Crm technology to improve the operations

Mini's sales department use CRM technology - How can Mini's sales department use CRM technology to improve the operations?

  Why is emotions management important in this job

To what extent do the three people featured in this case study manage their own emotions on the job? How would they accomplish this?To what extent do you think they effectively manage emotions under these circumstances?This case study states that ..

  You have recently been hired to improve the quality of

you have recently been hired to improve the quality of services at a healthcare organization. your supervisor would

  The goal by eliayhu goldratyour supply chain manager thinks

the goal by eliayhu goldratyour supply chain manager thinks that theories taught in the goal by eliayhu goldratt may

  Discuss how the website changes will help the client

A desciption of how you would use metadata and other promotion tools/methods to promote the redesigned website. Discuss how the website changes will help the client (Virtual Organization) be more successful in the future

  Examine risks of going global with an e-commerce business

Compare the major advantages and disadvantages of starting an e-commerce business versus a traditional brick-and-mortar business. Examine the significant risks of going global with an e-Commerce business.

  Network design and latency - what kind of testing program

Network Design and Latency - What kind of testing program (Prototype or Pilot) would you recommend to test the video conferencing among the remote offices? Why did you choose the method over other options?

  What moral theory-utilitarianism egoism

Consider the concepts of utilitarianism, egoism, and social contract. What moral theory-utilitarianism, egoism, or social contract-is consistent with cooperating with the other prisoner and rejecting self-interest as the best option? What is the r..

  Calculate the weekly staffing required at 40 hours per week

Create the Excel spreadsheet shown in Figure 1-18 to calculate the weekly staffing required, at 40 hours per week, for production levels of 200, 300, 400, and 500 units

  What are major types of is in organizations

What are the major types of IS in organizations, and how do they help serve the various needs of an organization?

  Describe different types of assets that need protection

IT Assets and Risk Management-Describe different types of assets that need protection

  Developing port scanner that successfully evade detection

The topic of our term project is developing a port scanner that can successfully evade detection by network defenders. Scanning is large component of the penetration testing cycle, especially when the tester isn't given any prior information about..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd