Discuss the supply chain risk in the cybersecurity industry

Assignment Help Management Information Sys
Reference no: EM131420207

Industry Profile : Supply Chain Risk in the Cybersecurity Industry

For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

1. Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:

a. Cyber Security Risks in Industrial Supply Chainshttps://www.securityweek.com/cyber-security-risks-industrial-supply-chains

b. Cybersecurity in the Supply Chain

https://www.lmi.org/CMSPages/getfile.aspx?nodeguid=adf22863-fca9-44ae-a93a-c20e21bae1e6&AspxAutoDetectCookieSupport=1

c. Cybersecurity Risks in the Supply Chain

https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf

d. Independent contractors, outsourcing providers and supply chain vendors: The weakest link in cybersecurity?

https://www.wiggin.com/files/30783_cybersecurity-update-winter-2015.pdf (pp. 2-3)

2. Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:

a. https://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf

b. https://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/

c. Cybersecurity: Five lessons learned the hard way

https://www.lexology.com/library/detail.aspx?g=e0e6d83f-3783-457a-8ce5-cda2ed9f3dcd

3. Research best practices and recommended strategies and approaches for managing global supply chain risk

a. 10 Supply Chain Risk Management Best Practices

https://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1

b. Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspace

https://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace

c. Managing Risk in Global ICT Supply Chains

https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf

d. Supply Chain Risk Management Awareness

https://www.afcea.org/committees/cyber/documents/Supplychain.pdf

Write

1. An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.

2. A supply chain riskssection in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.

3. A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.

4. A best practicessection in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.

5. A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.

Yourfive to eight pagepaper is to be prepared using basic APA formatting (including title page and reference list)and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples.Consult the grading rubric for specific content and formatting requirements for this assignment.

Reference no: EM131420207

Questions Cloud

Find the maximum metal removal rate during the cut : A face milling operation is performed to finish the top surface of a steel rectangular work piece 12.0 in long x 2.0 in wide. The milling cutter has four teeth (cemented carbide inserts) and a 3,0 in diameter.
Describe two ways you can incorporate coaching as training : As the clinic manager of the Berkeley College student-health center, you lead a team of eight nurses and nursing aides, many of whom are working their first health care job. Describe two ways you can incorporate coaching as a training and development..
Extensive investigation of the etruscans : The Mysterious Etruscans website provides an extensive investigation of the Etruscans and their contributions to Western culture. Among the topics examined are Etruscan art, history, religion, cities, lifestyles, and tombs.
Same path of revolution the conclusions : Why do you think that though Russia and France -the two nations went through the same path of Revolution the conclusions were different?
Discuss the supply chain risk in the cybersecurity industry : you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply ..
Determine the time to make one pass across the surface : A face milling operation is performed to finish the top surface of a steel rectangular work piece 12.0 in long x 2.0 in wide. The milling cutter has four teeth (cemented carbide inserts) and a 3,0 in diameter.
Taxi service is a new entrant to the taxi industry : Jake's Taxi Service is a new entrant to the taxi industry. It has achieve success by staking out a unique position in the industry. How did Jake's Taxi Service most likely achieve this position? Silver Screen Cinemas Inc. and Digi Now Inc. are two co..
How did the black consciousness movement : How did the black consciousness movement, led by Steve Bilko, become the most important factor in igniting the rebellious flames that swept the nation prior to, during, and after the Soweto uprising?
Discuss the application of speech recognition : Discuss why HCI is important and has evolved to ensure that the needs of different kinds of users are taken into account in computer systems. Discuss the application of speech recognition as a tool for Human Computer Interaction

Reviews

Write a Review

Management Information Sys Questions & Answers

  Technology in the hospitality industry

Do you feel it will be important to standardize technology on a worldwide basis for the hospitality industry?

  What is the role of the crisis communication plan

What is the role of the Crisis Communication Plan (CCP) in the NIST SP800-34 Framework? Does a CCP differ from a press release? If so, how? Are shareholder or consumer or employee or public perceptions about your handling of a disaster important? ..

  How do you protect yourself from ransomware

The name and URL of the video, 2) What the presentation was about, 3) How could you apply this to business, & 4) What you thought about it and how to apply in your personal life. Two pages and half.

  Defines the functional-performance specification of project

Defines the functional or performance specifications of the project's end product.Defines the major tasks or work elements to be performed to accomplish and produce all project deliverables.

  Technology advancement and data collection

Technology Advancement and Data Collection - How does the advancement of technology affect the ability to collect data? Provide examples. Does this advancement also increase the chance for errors?

  Initiate a project that includes developing software

Perfect IT Solutions is about to initiate a project that includes developing software for one of their clients.

  How they would benefit a smaller airline

Using the airlines example mentioned above, propose several possible IT solutions and how they would benefit a smaller airline to become more successful or attract more clients.

  Discusses what professional organizations you might join

Prepare a minimum 2 full-page paper (not including the title page, abstract, or references) that discusses what professional organizations you might join

  Discuss about the e-business and e-commerce

Determine the fundamental business advantages and disadvantages of e-business and e-commerce across the business organization. Next, select one (1) out of the five (5) key challenges faced by online retail businesses in the business-to-consumer (B..

  Explain the main reasons why you believe will be the case

From the e-Activity, choose the one (1) emerging technology you believe will have the biggest impact on telecommunications and network security within the next two (2) years, and explain the main reasons why you believe this will be the case. Just..

  Discuss the service strategy processes

CIS3008 IT Service Management 2016 Major Assignment. Many organisations manage their IT services at an operational level without a clear strategic focus. HSC intends to continue their ITIL adoption with processes from the Service Strategy phase. Di..

  Comparisons and functions of mdm software

Functions and Comparisons of MDM Software - Evaluate which of the three would work best for your organization and explain why you think it would be the best choice.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd