What drives customer demand in the cybersecurity market

Assignment Help Computer Engineering
Reference no: EM132388796

Assignment: Failure to understand what drives customer demand in the cybersecurity market can result in a quick trip to bankruptcy court or a forced sale of a company. For this reason, product developers, service providers, and other types of vendors (e.g. resellers, systems developers, federal or state contractors, etc.) need to understand what drives current and future customer demands and requirements for technologies, products, and services. Once the relevant market factors are identified, companies can develop strategies for meeting current and future demands for products and services -- figuring out what customers want to buy and then providing it at a profit.

One of the most commonly used sets of market factors is referred to as PEST. The four factors in this set are:

- Political-Legal factors (e.g. laws & regulations -- consider both current and proposed, cybercrime, cyber terrorism)

- Economic factors (e.g. fines for non-compliance with laws or regulations, availability of trained workforce, profitability of purchasers, availability of venture capital or credit for business startups)

- Socio-cultural factors (privacy concerns, pervasiveness of computers and digital devices, digital divide, "hacker" culture)

- Technological factors (product lifecycles, cloud computing, Internet of Things, etc.)

In this activity, you will explore the 4 PEST factors. Look for information that explains why a company must identify and assess the impact these factors have or will have on the demand for IT security solutions (products or services). (Hint: GDPR is having a significant impact on two factors -- political-legal and economic -- for companies that do business in Europe.)

Present your findings in a 3 to 5 paragraph briefing paper. Your audience is a group of technical and non technical managers who are attending a monthly meeting to learn more about the cybersecurity / IT Security Industry.

Post your briefing paper as a reply to this topic. Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Reference no: EM132388796

Questions Cloud

How smart tree is useful in the community : A Solar tree is a decorative means of producing solar energy and also electricity. It uses multiple no of solar panels which forms the shape of a tree.
Discuss the organization and reason for selecting it : You are a Consultant tasked with creating an ERM for an organization. Discuss the organization and reason for selecting it.
Demonstrate leadership skills and qualities : Describe a time where you demonstrated leadership skills and qualities. What did you learn from that experience that has shaped your leadership style?
Write response on ENT Medical Assistant : Assignment on Body System - Write response on ENT Medical Assistant that might occur for that body system
What drives customer demand in the cybersecurity market : Failure to understand what drives customer demand in the cybersecurity market can result in a quick trip to bankruptcy court or a forced sale of a company.
Cloud computing in health care : Security and the Cloud. Cloud Computing in Health Care.
Explain the proposed migration plan in detail : You will then create a 10- to 12-slide multimedia-rich Microsoft PowerPoint presentation that explains the proposed migration plan and includes the following.
Emotions and motivation affect the decision-making process : Explain how common biases, bounded awareness, emotions and motivation affect the decision-making process.
CSIT115 Data Management and Security Assignment Problem : CSIT115 Data Management and Security assignment help and solutions, University of Wollongong, assessment help - The business requirements described.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questionassume we have three classes alarmclock beeper and

questionassume we have three classes alarmclock beeper and alarmwindow. in following you see an interaction showing an

  What modern security methods and tools can be used

There are hundreds of thousands of potential cybersecurity attacks, which exist in the form of hackers, viruses, malware, ransomware, and other vectors.

  Determine how net neutrality will affect data networks

Base on your article review and the assigned reading, discuss how net neutrality will affect data networks and the availability of information to businesses.

  Design the logic for a program that merges the two files

Design the logic for a program that merges the two files into one file containing a list of all students in the district, maintaining student ID number order.

  Determine the qualities the position demand that you lack

Determine the qualities this position demand that you lack. Write a proposal for upper management on why you think you are qualified for this position.

  Write a detailed algorithm of the approximation algorithm

Write a detailed algorithm of the approximation algorithm for the Bin-Packing problem given in Section 9.5.2, and show that its time complexity is in T(n2).

  Design a combinational circuit with four input lines

Design a combinational circuit with four input lines that represent a decimal digit in BCD and four output lines that generate the 9's complement of the input digit.

  Explain difference between a state graph and a search tree

For artificial intelligence systems to adapt to new situations, the first task is to develop a method for machines to resolve problems 'on their own'.

  Describe the goals and objectives of the project

Develop a thirty to forty (30-40) page project plan in which you: Write a five to ten (5-10) page executive summary that provides a high-level technical.

  Write a program that used a stack to test input strings

Write a program that used a stack to test input strings to determine whether they are palindromes.

  How many students in the iclassroster file are in it program

Determine how many students in the iclassroster file are in the IT program. Determine how many students in the iclassroster file are seniors in the IT program.

  Show a list of all the polling organizations

Show a list of all the polling organizations. Count the number of unique polling organizations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd