Discuss the supply chain risk in the cybersecurity industry

Assignment Help Management Information Sys
Reference no: EM131420207

Industry Profile : Supply Chain Risk in the Cybersecurity Industry

For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

1. Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:

a. Cyber Security Risks in Industrial Supply Chainshttps://www.securityweek.com/cyber-security-risks-industrial-supply-chains

b. Cybersecurity in the Supply Chain

https://www.lmi.org/CMSPages/getfile.aspx?nodeguid=adf22863-fca9-44ae-a93a-c20e21bae1e6&AspxAutoDetectCookieSupport=1

c. Cybersecurity Risks in the Supply Chain

https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf

d. Independent contractors, outsourcing providers and supply chain vendors: The weakest link in cybersecurity?

https://www.wiggin.com/files/30783_cybersecurity-update-winter-2015.pdf (pp. 2-3)

2. Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:

a. https://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf

b. https://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/

c. Cybersecurity: Five lessons learned the hard way

https://www.lexology.com/library/detail.aspx?g=e0e6d83f-3783-457a-8ce5-cda2ed9f3dcd

3. Research best practices and recommended strategies and approaches for managing global supply chain risk

a. 10 Supply Chain Risk Management Best Practices

https://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1

b. Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspace

https://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace

c. Managing Risk in Global ICT Supply Chains

https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf

d. Supply Chain Risk Management Awareness

https://www.afcea.org/committees/cyber/documents/Supplychain.pdf

Write

1. An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.

2. A supply chain riskssection in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.

3. A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.

4. A best practicessection in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.

5. A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.

Yourfive to eight pagepaper is to be prepared using basic APA formatting (including title page and reference list)and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples.Consult the grading rubric for specific content and formatting requirements for this assignment.

Reference no: EM131420207

Questions Cloud

Find the maximum metal removal rate during the cut : A face milling operation is performed to finish the top surface of a steel rectangular work piece 12.0 in long x 2.0 in wide. The milling cutter has four teeth (cemented carbide inserts) and a 3,0 in diameter.
Describe two ways you can incorporate coaching as training : As the clinic manager of the Berkeley College student-health center, you lead a team of eight nurses and nursing aides, many of whom are working their first health care job. Describe two ways you can incorporate coaching as a training and development..
Extensive investigation of the etruscans : The Mysterious Etruscans website provides an extensive investigation of the Etruscans and their contributions to Western culture. Among the topics examined are Etruscan art, history, religion, cities, lifestyles, and tombs.
Same path of revolution the conclusions : Why do you think that though Russia and France -the two nations went through the same path of Revolution the conclusions were different?
Discuss the supply chain risk in the cybersecurity industry : you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply ..
Determine the time to make one pass across the surface : A face milling operation is performed to finish the top surface of a steel rectangular work piece 12.0 in long x 2.0 in wide. The milling cutter has four teeth (cemented carbide inserts) and a 3,0 in diameter.
Taxi service is a new entrant to the taxi industry : Jake's Taxi Service is a new entrant to the taxi industry. It has achieve success by staking out a unique position in the industry. How did Jake's Taxi Service most likely achieve this position? Silver Screen Cinemas Inc. and Digi Now Inc. are two co..
How did the black consciousness movement : How did the black consciousness movement, led by Steve Bilko, become the most important factor in igniting the rebellious flames that swept the nation prior to, during, and after the Soweto uprising?
Discuss the application of speech recognition : Discuss why HCI is important and has evolved to ensure that the needs of different kinds of users are taken into account in computer systems. Discuss the application of speech recognition as a tool for Human Computer Interaction

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd