Reference no: EM131420207
Industry Profile : Supply Chain Risk in the Cybersecurity Industry
For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.
Research
1. Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:
a. Cyber Security Risks in Industrial Supply Chainshttps://www.securityweek.com/cyber-security-risks-industrial-supply-chains
b. Cybersecurity in the Supply Chain
https://www.lmi.org/CMSPages/getfile.aspx?nodeguid=adf22863-fca9-44ae-a93a-c20e21bae1e6&AspxAutoDetectCookieSupport=1
c. Cybersecurity Risks in the Supply Chain
https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf
d. Independent contractors, outsourcing providers and supply chain vendors: The weakest link in cybersecurity?
https://www.wiggin.com/files/30783_cybersecurity-update-winter-2015.pdf (pp. 2-3)
2. Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:
a. https://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf
b. https://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/
c. Cybersecurity: Five lessons learned the hard way
https://www.lexology.com/library/detail.aspx?g=e0e6d83f-3783-457a-8ce5-cda2ed9f3dcd
3. Research best practices and recommended strategies and approaches for managing global supply chain risk
a. 10 Supply Chain Risk Management Best Practices
https://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1
b. Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspace
https://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace
c. Managing Risk in Global ICT Supply Chains
https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf
d. Supply Chain Risk Management Awareness
https://www.afcea.org/committees/cyber/documents/Supplychain.pdf
Write
1. An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.
2. A supply chain riskssection in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.
3. A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.
4. A best practicessection in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.
5. A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.
Yourfive to eight pagepaper is to be prepared using basic APA formatting (including title page and reference list)and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples.Consult the grading rubric for specific content and formatting requirements for this assignment.
Find the maximum metal removal rate during the cut
: A face milling operation is performed to finish the top surface of a steel rectangular work piece 12.0 in long x 2.0 in wide. The milling cutter has four teeth (cemented carbide inserts) and a 3,0 in diameter.
|
Describe two ways you can incorporate coaching as training
: As the clinic manager of the Berkeley College student-health center, you lead a team of eight nurses and nursing aides, many of whom are working their first health care job. Describe two ways you can incorporate coaching as a training and development..
|
Extensive investigation of the etruscans
: The Mysterious Etruscans website provides an extensive investigation of the Etruscans and their contributions to Western culture. Among the topics examined are Etruscan art, history, religion, cities, lifestyles, and tombs.
|
Same path of revolution the conclusions
: Why do you think that though Russia and France -the two nations went through the same path of Revolution the conclusions were different?
|
Discuss the supply chain risk in the cybersecurity industry
: you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply ..
|
Determine the time to make one pass across the surface
: A face milling operation is performed to finish the top surface of a steel rectangular work piece 12.0 in long x 2.0 in wide. The milling cutter has four teeth (cemented carbide inserts) and a 3,0 in diameter.
|
Taxi service is a new entrant to the taxi industry
: Jake's Taxi Service is a new entrant to the taxi industry. It has achieve success by staking out a unique position in the industry. How did Jake's Taxi Service most likely achieve this position? Silver Screen Cinemas Inc. and Digi Now Inc. are two co..
|
How did the black consciousness movement
: How did the black consciousness movement, led by Steve Bilko, become the most important factor in igniting the rebellious flames that swept the nation prior to, during, and after the Soweto uprising?
|
Discuss the application of speech recognition
: Discuss why HCI is important and has evolved to ensure that the needs of different kinds of users are taken into account in computer systems. Discuss the application of speech recognition as a tool for Human Computer Interaction
|