1.Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas?
2. Industry Profile Part 2:
Supply Chain Risk in the Cybersecurity Industry
paper, you will research and report upon the problem of Supply Chain Risk as it
pertains to the cybersecurity industry. You will also investigate due diligence and other business
processes / strategies which can be used to mitigate the impacts of supply
chain risk for companies who produce and sell cybersecurity related products
1. Global Supply Chain Risks affecting the
Cybersecurity Industry. Here are some suggested resources to get you started:
a. Cyber Security Risks in Industrial Supply
b. Cybersecurity in the Supply Chain
Risks in the Supply Chain
outsourcing providers and supply chain vendors: The weakest link in
2. Investigate due diligence as it applies to the
purchase of components or services from vendors. Answer the question: how can due diligence processes help a company
manage supply chain risks? Here are some suggested resources:
c. Cybersecurity: Five lessons learned the hard
3. Research best
practices and recommended strategies and approaches for managing global supply
a. 10 Supply Chain Risk Management Best
b. Cyber Supply Chain Security: A Crucial Step
Toward U.S. Security, Prosperity, and Freedom in Cyberspacehttp://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace
c. Managing Risk in Global ICT Supply Chains https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf
d. Supply Chain Risk Management Awareness http://www.afcea.org/committees/cyber/documents/Supplychain.pdf
1. An introduction section which provides a brief
overview of the problem of supply chain risk as it pertains to the
2. A supply chain risks section in which you
identify and describe 5 or more specific sources of supply chain risk which
impact cybersecurity related products and services.
3. A due diligence section in which you
address the use of diligence processes (investigating suppliers before entering
into contracts) as a supply chain risk management strategy. Include 5 or more
cybersecurity related questions which should be asked of suppliers during the
due diligence process.
4. A best practices section in which you
address 5 or more best practices for managing global supply chain risks in the
cybersecurity industry. You must also provide an evaluation of the expected
benefits from implementing each of these practices.
5. A summary and conclusions section in which
you present an overall picture of the supply chain risk problem in the
cybersecurity industry and best practices for managing supply chain risks.
Your five to
eight page paper is to be prepared using basic APA formatting (including title
page and reference list) and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk
entry in your assignments folder. See the sample paper and paper template
provided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specific
content and formatting requirements for this assignment.
For this case study, you are asked to (a) read the
International Chamber of Commerce’s Cybersecurity Guide for Business and (b) watch
three scenario segments from the “Scenario Based Planning” session at the 2015
Global Conference on Cyber Space. After you have done so, develop your answer to
the question: How can we improve global cooperation in response to cybersecurity challenges
Your audience for this case study is a panel session at
a conference attended primarily by industry representatives from U.S.
companies. Your task is to prepare a two to three page white paper which
summarizes your response to the question. [This paper would be provided to
session attendees in advance of the panel discussion.]
Watch the Scenario
Based Planning video from the 2015 Global Conference on Cyber Space https://www.youtube.com/watch?v=8kyj2HBqDyM
Start of Session is at 5:05:00 on Live Stream
Channel #1 (or click on “Scenario Based Planning” menu item in lower left hand
corner of video at startup).
The three “scenario videos” (approx. 6 mins
each) occur at the following times in the livestream channel recording:
5:11:00 – 5:17:30
5:35:30 – 5:41:30
6:05:30 – 6:12:10
End of Session is at 6:28:00
Review the recommendations from the
International Chamber of Commerce Cybersecurity
Guide for Business http://www.iccwbo.org/Data/Documents/Digital-Economy/Cyber-Security-Guide-for-Business/ICC-Cyber-security-guide-for-business/
three or more additional sources to support your answer to the case question.
Using standard terminology
(see case study #1), write a two to three page response to the panel question.
At a minimum, your summary must include the following:
introduction which addresses the reasons why cooperation on a global basis is
required to address cybersecurity challenges. This introduction should focus on
political, economic, and social factors.
separate section in which you discuss the business
need for cooperation on a global basis. This discussion should include examples
of global, multinational business which operate in cyberspace and the
cybersecurity challenges each business faces. Use the “global” companies from
the Industry Profile Project as your examples. These companies include: Amazon,
Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter,
separate section in which you identify and discuss three or more specific
cooperative efforts (e.g. alliances, associations, public/private partnerships)
which currently exist. These may be industry specific, national, or
closing section (“Recommendations”) in which you identify, discuss, and
recommend three or more specific actions which global businesses as a whole can
take to improve cooperation within and across industries for the purposes of
addressing the cybersecurity challenges which you previously identified. This
section should provide an overall answer to the general question: How
can we improve global cooperation in response to cybersecurity challenges in
Submit For Grading & Discussion
your case study in MS Word format (.docx or .doc file) using the Case Study #4 Assignment
in your assignment folder. (Attach the file.)
your case study for discussion with your classmates. First, create a new topic
in the Case Study #4 Discussion Forum. Then, paste the contents of your Case
Study #4 document directly into that message. (Do not attach the file.)
posting or no posting for discussion will be penalized heavily so it is in your
best interests to post your case study before the assigned due date.
standard APA formatting for the MS Word document that you submit to your
assignment folder. Formatting requirements and examples are found under Course Resources
> APA Resources.
are expected to write grammatically correct English in every assignment that
you submit for grading. Do not turn in any work without (a) using spell check,
(b) using grammar check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly structured sentences
and paragraphs. These items are graded under Professionalism and constitute 15%
of the assignment grade.
are expected to credit your sources using in-text citations and reference list
entries. Both your citations and your reference list entries must comply with
APA 6th edition Style requirements. Failure to credit your sources will result
in penalties as provided for under the university’s Academic Integrity policy.