Supply Chain Risk in the Cybersecurity Industry, writing homework help

Get perfect grades by consistently using Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20

Order a Similar Paper Order a Different Paper

2. Industry Profile Part 2:
Supply Chain Risk in the Cybersecurity Industry

For this
paper, you will research and report upon the problem of Supply Chain Risk as it
pertains to the cybersecurity industry. You will also investigate due diligence and other business
processes / strategies which can be used to mitigate the impacts of supply
chain risk for companies who produce and sell cybersecurity related products
and services.


1.   Global Supply Chain Risks affecting the
Cybersecurity Industry. Here are some suggested resources to get you started:

a.  Cyber Security Risks in Industrial Supply

b.  Cybersecurity in the Supply Chain‌getfile.aspx?‌nodeguid=‌adf22863-‌fca9-44ae-a93a-c20e21bae1e6&‌AspxAutoDetectCookieSupport=1

Risks in the Supply Chain

Independent contractors,
outsourcing providers and supply chain vendors: The weakest link in
(pp. 2-3)

2.  Investigate due diligence as it applies to the
purchase of components or services from vendors. Answer the question: how can due diligence processes help a company
manage supply chain risks? Here are some suggested resources:



c.  Cybersecurity: Five lessons learned the hard

3.  Research best
practices and recommended strategies and approaches for managing global supply
chain risk

a.  10 Supply Chain Risk Management Best

b.  Cyber Supply Chain Security: A Crucial Step
Toward U.S. Security, Prosperity, and Freedom in Cyberspace

c.  Managing Risk in Global ICT Supply Chains

d.  Supply Chain Risk Management Awareness


1.  An introduction section which provides a brief
overview of the problem of supply chain risk as it pertains to the
cybersecurity industry.

2.  A supply chain risks section in which you
identify and describe 5 or more specific sources of supply chain risk which
impact cybersecurity related products and services.

3.  A due diligence section in which you
address the use of diligence processes (investigating suppliers before entering
into contracts) as a supply chain risk management strategy. Include 5 or more
cybersecurity related questions which should be asked of suppliers during the
due diligence process.

4.  A best practices section in which you
address 5 or more best practices for managing global supply chain risks in the
cybersecurity industry. You must also provide an evaluation of the expected
benefits from implementing each of these practices.

5.  A summary and conclusions section in which
you present an overall picture of the supply chain risk problem in the
cybersecurity industry and best practices for managing supply chain risks.

Your five to
eight page paper is to be prepared using basic APA formatting (including title
page and reference list) and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk
entry in your assignments folder. See the sample paper and paper template
provided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specific
content and formatting requirements for this assignment.


Case Scenario:

For this case study, you are asked to (a) read the
International Chamber of Commerce’s Cybersecurity Guide for Business and (b) watch
three scenario segments from the “Scenario Based Planning” session at the 2015
Global Conference on Cyber Space. After you have done so, develop your answer to
the question: How can we improve global cooperation in response to cybersecurity challenges
in cyberspace?

Your audience for this case study is a panel session at
a conference attended primarily by industry representatives from U.S.
companies. Your task is to prepare a two to three page white paper which
summarizes your response to the question. [This paper would be provided to
session attendees in advance of the panel discussion.]


Watch the Scenario
Based Planning
video from the 2015 Global Conference on Cyber Space

Start of Session is at 5:05:00 on Live Stream
Channel #1 (or click on “Scenario Based Planning” menu item in lower left hand
corner of video at startup).

The three “scenario videos” (approx. 6 mins
each) occur at the following times in the livestream channel recording:

5:11:00 – 5:17:30

5:35:30 – 5:41:30

6:05:30 – 6:12:10

End of Session is at 6:28:00

Review the recommendations from the
International Chamber of Commerce Cybersecurity
Guide for Business

3.  Find
three or more additional sources to support your answer to the case question.


Using standard terminology
(see case study #1), write a two to three page response to the panel question.
At a minimum, your summary must include the following:

1.  An
introduction which addresses the reasons why cooperation on a global basis is
required to address cybersecurity challenges. This introduction should focus on
political, economic, and social factors.

2.  A
separate section in which you discuss the business
for cooperation on a global basis. This discussion should include examples
of global, multinational business which operate in cyberspace and the
cybersecurity challenges each business faces. Use the “global” companies from
the Industry Profile Project as your examples. These companies include: Amazon,
Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter,
and Yahoo.

3.  A
separate section in which you identify and discuss three or more specific
cooperative efforts (e.g. alliances, associations, public/private partnerships)
which currently exist. These may be industry specific, national, or
international efforts.

4.  A
closing section (“Recommendations”) in which you identify, discuss, and
recommend three or more specific actions which global businesses as a whole can
take to improve cooperation within and across industries for the purposes of
addressing the cybersecurity challenges which you previously identified. This
section should provide an overall answer to the general question: How
can we improve global cooperation in response to cybersecurity challenges in

Submit For Grading & Discussion

1.  Submit
your case study in MS Word format (.docx or .doc file) using the Case Study #4 Assignment
in your assignment folder. (Attach the file.)

2.  Post
your case study for discussion with your classmates. First, create a new topic
in the Case Study #4 Discussion Forum. Then, paste the contents of your Case
Study #4 document directly into that message. (Do not attach the file.)  

3.  Last
posting or no posting for discussion will be penalized heavily so it is in your
best interests to post your case study before the assigned due date.

Formatting Instructions

1.  Use
standard APA formatting for the MS Word document that you submit to your
assignment folder. Formatting requirements and examples are found under Course Resources
> APA Resources.

Additional Information

1.  You
are expected to write grammatically correct English in every assignment that
you submit for grading. Do not turn in any work without (a) using spell check,
(b) using grammar check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly structured sentences
and paragraphs. These items are graded under Professionalism and constitute 15%
of the assignment grade.

2.  You
are expected to credit your sources using in-text citations and reference list
entries. Both your citations and your reference list entries must comply with
APA 6th edition Style requirements. Failure to credit your sources will result
in penalties as provided for under the university’s Academic Integrity policy.

"Is this question part of your assignment? We can help"


Need help with an assignment? We work for the best interests of our clients. We maintain professionalism and offer brilliant writing services in most of the fields ranging from nursing, philosophy, psychology, biology, finance, accounting, criminal justice, mathematics, computer science, among others. We offer CONFIDENTIAL, ORIGINAL (Turnitin & SafeAssign checks), and PRIVATE services using the latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and doctorate-prepared writers. Thank you in advance!

Get a 15% discount on your order using the following coupon code SAVE15

Order a Similar Paper Order a Different Paper