Discuss the supply chain risk in the cybersecurity industry

Assignment Help Management Information Sys
Reference no: EM131420207

Industry Profile : Supply Chain Risk in the Cybersecurity Industry

For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

1. Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:

a. Cyber Security Risks in Industrial Supply Chainshttps://www.securityweek.com/cyber-security-risks-industrial-supply-chains

b. Cybersecurity in the Supply Chain

https://www.lmi.org/CMSPages/getfile.aspx?nodeguid=adf22863-fca9-44ae-a93a-c20e21bae1e6&AspxAutoDetectCookieSupport=1

c. Cybersecurity Risks in the Supply Chain

https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf

d. Independent contractors, outsourcing providers and supply chain vendors: The weakest link in cybersecurity?

https://www.wiggin.com/files/30783_cybersecurity-update-winter-2015.pdf (pp. 2-3)

2. Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:

a. https://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf

b. https://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/

c. Cybersecurity: Five lessons learned the hard way

https://www.lexology.com/library/detail.aspx?g=e0e6d83f-3783-457a-8ce5-cda2ed9f3dcd

3. Research best practices and recommended strategies and approaches for managing global supply chain risk

a. 10 Supply Chain Risk Management Best Practices

https://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1

b. Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspace

https://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace

c. Managing Risk in Global ICT Supply Chains

https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf

d. Supply Chain Risk Management Awareness

https://www.afcea.org/committees/cyber/documents/Supplychain.pdf

Write

1. An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.

2. A supply chain riskssection in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.

3. A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.

4. A best practicessection in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.

5. A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.

Yourfive to eight pagepaper is to be prepared using basic APA formatting (including title page and reference list)and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples.Consult the grading rubric for specific content and formatting requirements for this assignment.

Reference no: EM131420207

Questions Cloud

Find the maximum metal removal rate during the cut : A face milling operation is performed to finish the top surface of a steel rectangular work piece 12.0 in long x 2.0 in wide. The milling cutter has four teeth (cemented carbide inserts) and a 3,0 in diameter.
Describe two ways you can incorporate coaching as training : As the clinic manager of the Berkeley College student-health center, you lead a team of eight nurses and nursing aides, many of whom are working their first health care job. Describe two ways you can incorporate coaching as a training and development..
Extensive investigation of the etruscans : The Mysterious Etruscans website provides an extensive investigation of the Etruscans and their contributions to Western culture. Among the topics examined are Etruscan art, history, religion, cities, lifestyles, and tombs.
Same path of revolution the conclusions : Why do you think that though Russia and France -the two nations went through the same path of Revolution the conclusions were different?
Discuss the supply chain risk in the cybersecurity industry : you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply ..
Determine the time to make one pass across the surface : A face milling operation is performed to finish the top surface of a steel rectangular work piece 12.0 in long x 2.0 in wide. The milling cutter has four teeth (cemented carbide inserts) and a 3,0 in diameter.
Taxi service is a new entrant to the taxi industry : Jake's Taxi Service is a new entrant to the taxi industry. It has achieve success by staking out a unique position in the industry. How did Jake's Taxi Service most likely achieve this position? Silver Screen Cinemas Inc. and Digi Now Inc. are two co..
How did the black consciousness movement : How did the black consciousness movement, led by Steve Bilko, become the most important factor in igniting the rebellious flames that swept the nation prior to, during, and after the Soweto uprising?
Discuss the application of speech recognition : Discuss why HCI is important and has evolved to ensure that the needs of different kinds of users are taken into account in computer systems. Discuss the application of speech recognition as a tool for Human Computer Interaction

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Determine the skills required for each role

Identify the roles needing to be filled. Determine the skills required for each role. Determine the skill sets of the team members. Assign team members to roles.

  Vulnerability assessments for mobile devices

Vulnerability assessments for Mobile Devices

  Analyze most of enactment of health insurance portability

From the first and second e-Activities, analyze the importance of the enactment of the Health Insurance Portability and Accountability Act (HIPAA), and appraise the overall impact of HIPAA on patients' medical records.

  Information technology managmentsoon cell phones will be

information technology managmentsoon cell phones will be equipped with gps chips that enable users to be located within

  Craft a security management plan for your organization

As you begin to craft a Security Management Plan for your organization to secure and protect the quality and integrity of the data, you will take this opportunity in the first assignment to create the shell of your Security Management Plan.

  Problems that project managers will faceexplain four

problems that project managers will faceexplain four problems that project managers will face in the coming decade.pick

  Complete a roadmap of the current it projects

Using the case provided, build on Part 1 of your IT Strategic Plan. Develop IT strategies to align to the business strategies, complete a roadmap of the current IT projects, propose a new IT project to support the IT strategies, identify risks ass..

  Explain how logical and physical representations of system

Logical and physical representations - Explain how logical and physical representations of a To-Be system will differ.

  Define broadband and baseband transmission technology

In 10 or more pages, address the following topics (be sure to use diagrams as well as references).  1) Define broadband and baseband transmission technology.

  Describe role of acquiring bank in processing online payment

Identify the types of companies that might offer a store-branded charge card. Describe the role of an acquiring bank in processing online payment transactions.

  Challenges organizations face in developing ads

Explian the difference between developed and developing markets. Do you think it impacts advertising strategies? Explain. and Discuss the challenges organizations face in developing ads for international marketplaces.

  Detailed explanation to activity based costinghow in

detailed explanation to activity based costinghow in principle do activity based costing abc and activity based

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd