Provide a brief overview of the problem of supply chain risk

Assignment Help Management Information Sys
Reference no: EM131325339

Industry Profile: Supply Chain Risk in the Cybersecurity Industry

For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

1. Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:

a. Cyber Security Risks in Industrial Supply Chainshttps://www.securityweek.com/cyber-security-risks-industrial-supply-chains

b. Cybersecurity in the Supply Chain
https://www.lmi.org/CMSPages/getfile.aspx?nodeguid=adf22863-fca9-44ae-a93a-c20e21bae1e6&AspxAutoDetectCookieSupport=1

c. Cybersecurity Risks in the Supply Chain
https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf

d. Independent contractors, outsourcing providers and supply chain vendors: The weakest link in cybersecurity? https://www.wiggin.com/files/30783_cybersecurity-update-winter-2015.pdf (pp. 2-3)

2. Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:

a. https://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf

b. https://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/

c. Cybersecurity: Five lessons learned the hard wayhttps://www.lexology.com/library/detail.aspx?g=e0e6d83f-3783-457a-8ce5-cda2ed9f3dcd

3. Research best practices and recommended strategies and approaches for managing global supply chain risk

a. 10 Supply Chain Risk Management Best Practiceshttps://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1

b. Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspacehttps://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace

c. Managing Risk in Global ICT Supply Chains https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf

d. Supply Chain Risk Management Awarenesshttps://www.afcea.org/committees/cyber/documents/Supplychain.pdf

Write

1. An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.

2. A supply chain riskssection in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.

3. A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.

4. A best practicessection in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.

5. A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.

Yourfive to eight pagepaper is to be prepared using basic APA formatting (including title page and reference list)and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples.Consult the grading rubric for specific content and formatting requirements for this assignment.

Reference no: EM131325339

Questions Cloud

Rounding off of terminal cells of a hypha : What is formed by enlargement and rounding off of terminal cells of a hypha?
Write your thesis statement to present the supporting points : Write your thesis statement to present the supporting points that will be discussed in the body paragraphs.
Potential problems that gmos might cause : Should we be concerned about eating food processed from genetically modified organisms (GMOs) or is this concern unfounded? Besides possible food issues, are there any other potential problems that GMOs might cause?
What is the purpose of risk management industry standards : What is the purpose of risk management industry standards? What responsibilities does senior management assume in a risk management system?
Provide a brief overview of the problem of supply chain risk : An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.
Opinions of the scientific community and american society : Go to the internet and research the opinions of the scientific community and American society surrounding infant and childhood immunizations. Find at least one article describing the uses and benefits of immunizations.
Explain what accounting entries would be done : Explain what accounting entries would be done and how the firm's earnings and balance sheet would be affected.
What problems do you foresee occurring : What problems do you foresee occurring with four generations as members of the same workgroup - What communication strategies would you suggest to minimize the differences and create a cohesive team?
Discuss why globalization has profound implications : Globalization presents new frontiers and challenges for labor organizations. These changes include westernized labor mindsets being introduced into foreign cultures, which often collide with pre-existing organized labor in the host countries.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analysis and evaluation of a users message

Analysis and evaluation of a user's message is likely to occur during which type of listening

  Analyze the fundamental impact of it architecture

Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry.

  What is network neutrality

What is network neutrality? Why has the Internet operated under net neutrality up to this point in time

  Business process re-engineering in the real worldprovide an

business process re-engineering in the real worldprovide an example of a real-world situation where business process

  How could it negatively impact the security of the users

As for the other three areas that will be covered in the paper. What are those trade agreements, why was it voted for, and how could it negatively impact the security of the users in the participated countries in the agreement

  What are some guidelines for an effective security policy

What are some guidelines for an effective security policy and What are 5 pillars of IT security? Explain them

  Discuss some of the pros and cons of software as a service

Software as a Service (SaaS): Discuss some of the pros and cons of using software as a service.

  Describe in detail how this organization manages components

What personal knowledge management tools does this organization utilize? What steps has this organization taken in securing their information and knowledge? What has this organization done to gain and sustain an advantage over their competitors?

  Explain sdlc waterfall approach

SDLC Waterfall Approach - Why is an accurate and complete requirements definition especially critical when using the SDLC "waterfall" approach?

  Show importance of good managers and good systems

Discussion after the speech focuses on the importance of good managers and good systems. You participate by explaining why both are integral to an organization and the effects, if any, of an imbalance within any of these areas.

  Show business presentation example with excessive technology

Business Presentation Examples with Excessive Technology and Distracting Visual Aids Sometimes, technology and visual aids can be more of a distraction than a helpful component to a presentation.

  Disadvantages of a lock down environment in iti need

disadvantages of a lock down environment in iti need assistance with figuring out some disadvantages a business may

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd