Discuss three or more specific cooperative efforts

Assignment Help Management Information Sys
Reference no: EM131391283

Assignemnt: Cybersecurity in Business & Industry

Case Study: How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?

Case Scenario:

For this case study, you are asked to (a)read the International Chamber of Commerce's Cybersecurity Guide for Business and (b) watch three scenario segments from the"Scenario Based Planning" session at the 2015 Global Conference on Cyber Space. After you have done so, develop your answer to the question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?
Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies. Your task is to prepare a two to three page white paper which summarizes your response to the question. [This paper would be provided to session attendees in advance of the panel discussion.]

Research:

1. Watch the Scenario Based Planning video from the 2015 Global Conference on Cyber Space https://www.youtube.com/watch?v=8kyj2HBqDyM

a. Start of Session is at 5:05:00 on Live Stream Channel #1 (or click on "Scenario Based Planning" menu item in lower left hand corner of video at startup).

b. The three "scenario videos" (approx. 6mins each) occur at the following times in the livestream channel recording:

i. 5:11:00 - 5:17:30
ii. 5:35:30 - 5:41:30
iii. 6:05:30 - 6:12:10

c. End of Session is at 6:28:00

2. Review the recommendations from the International Chamber of Commerce Cybersecurity Guide for Businesshttps://www.iccwbo.org/Data/Documents/Digital-Economy/Cyber-Security-Guide-for-Business/ICC-Cyber-security-guide-for-business/

3. Find three or more additional sources to support your answer to the case question.

Write:

Using standard terminology (see case study #1), write a two to three page response to the panel question. At a minimum, your summary must include the following:

1. An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity challenges. This introduction should focus on political, economic, and social factors.

2. A separate section in which you discuss the business need for cooperation on a global basis. This discussion should include examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces. Use the "global" companies from the Industry Profile Project as your examples. These companies include: Amazon, Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter, and Yahoo.

3. A separate section in which you identify and discuss three or more specific cooperative efforts (e.g. alliances, associations, public/private partnerships) which currently exist. These may be industry specific, national, or international efforts.

4. A closing section ("Recommendations") in which you identify, discuss, and recommend three or more specific actions which global businesses as a whole can take to improve cooperation within and across industries for the purposes of addressing the cybersecurity challenges which you previously identified. This section should provide an overall answer to the general question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Reference no: EM131391283

Questions Cloud

Determining the competing internationally : When making purchasing decisions, should a corporation reduce its ethical standards in order to allow the company to compete internationally? Take a position and defend your answer.
Explain an example of data you had to look : Computer Applications class. Must be 250 words. Explain an example of data you had to look at that would have been easier to understand if a chart had been provided?
Types of information should come from the audit : When deciding to form a strategic partnership, the text recommends performing an audit of needs and overall strategies with regard to logistics operations. What is the goal of the audit, and what types of information should come from the audit?
Find the two possible rates of steady precession of the cone : Knowing that the cone is spinning about its axis of symmetry AB at the rate of 3000 rpm and that AB forms an angle ß = 60° with the vertical axis AC, determine the two possible rates of steady precession of the cone about the axis AC.
Discuss three or more specific cooperative efforts : CSIA 350- A separate section in which you identify and discuss three or more specific cooperative efforts which currently exist. These may be industry specific, national, or international efforts.
Have you identified and included the link to unique websites : Have you identified and included the link to at least four unique websites?Have you provided a review of each website that notes its strengths and weaknesses in the information presented from the perspective of an HR professional?
Describe three forms of nonverbal communication : GEB3213 BUSINESS COMMUNICATIONS. Describe three forms of nonverbal communication and give a workplace example of each. Researching may involve informal or formal methods. List and describe two informal research methods and two formal research method..
Determine the two possible rates of steady precession : Knowing that c = 37.5 mm and that the rate of spin of the top about its axis of symmetry is 1800 rpm, determine the two possible rates of steady precession corresponding to θ = 30°.
Discuss about the introduction of labour management : Based on the context of singapore , provide an analytical report on the importance of the 4 key players in enhancing effective labour management relations , Provide example on how the aforementioned contribute to the competitive advantage of the ..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Mis subject business management information systems

subject business management information systems mis ltbrgtrequested due date 090614 1115pm edt ltbrgtstudent3939s time

  Summary report of a computer crime

Computer Crime and Punishment - summary report of a computer crime or cyber crime committed by using a covert online money transfer site.

  Explain how the system could be verified as operational

Describe the series of malicious events that led up to the incident. Identify who needs to be notified based on the type and severity of the incident. Outline how the incident could be contained.

  Discuss how the development of informational resources

Discuss how the development of an informational resource, or your work in the discussion board, has helped you understand how to evaluate the credibility of online sources in an academic environment

  Analyze impact of culture on interpersonal communications

Differentiate appropriate levels of self-disclosure and emotional intelligence in various relationships. Describe strategies for using communication techniques to resolve interpersonal conflicts. Analyze the impact of gender and culture on interperso..

  Correct entry to record

Plunder Inc. accepted a six-month noninterest-bearing note for $2,800 on January 1, 2011. The note was accepted as payment of a delinquent receivable of $2,500. What is the correct entry to record the note?

  How and when electronic data must be produced

What it covers: In place since 1938, the FRCP discovery rules govern court procedures for civil lawsuits. The first major revisions, made in 2006, make clear that electronically stored information is discoverable, and they detail what, how and whe..

  Choose an organization delivering goods andor services

choose an organization delivering goods andor services globally.provide a background of the organization and fully

  Summarize an article about disruptive technology

The assignment is to summarize an article about Disruptive Technology and then write a clear opinion of the article based on your knowledge and the background

  Discuss various application of computer from their dailylife

Discuss various applications of computer from their daily life with a focus on modern applications and challenges of computer systems.

  Hired developer to focus on improving his coding skills

Imagine you are the manager of a medium-sized IT department. While walking through the hall one day, you overhear a senior-level software developer telling a newly hired developer to focus on improving his coding skills rather than learning about ..

  What are some it particular strategies for negotiating

What are some IT particular strategies for negotiating with all departments to get the proper resources and budget necessary to support an IS project properly?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd