Supply-Chain-Risk-in-the-Cybersecurity-Industry-writing-homework-help

2. Industry Profile Part 2: Supply Chain Risk in the Cybersecurity Industry

For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry. You will also investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

1.   Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:

a.  Cyber Security Risks in Industrial Supply Chainshttp://www.securityweek.com/cyber-security-risks-industrial-supply-chains

b.  Cybersecurity in the Supply Chain

http://www.lmi.org/CMSPages/‌getfile.aspx?‌nodeguid=‌adf22863-‌fca9-44ae-a93a-c20e21bae1e6&‌AspxAutoDetectCookieSupport=1

c.  Cybersecurity Risks in the Supply Chain

https://www.cert.gov.uk/wp-content/uploads/2015/02/Cyber-security-risks-in-the-supply-chain.pdf

d.  Independent contractors, outsourcing providers and supply chain vendors: The weakest link in cybersecurity? http://www.wiggin.com/‌files/‌30783_‌cybersecurity-‌update-winter-2015.pdf  (pp. 2-3)

2.  Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:

a.  http://www.cips.org/Documents/Knowledge/Procurement-Topics-and-Skills/3-Risk-Mitigation/Diligent-Procurement/Due_diligence-Procurement_Topic.pdf

b.  http://blogs.wsj.com/cio/2014/03/21/going-beyond-due-diligence-to-monitor-vendor-cybersecurity/

c.  Cybersecurity: Five lessons learned the hard wayhttp://www.lexology.com/library/detail.aspx?g=e0e6d83f-3783-457a-8ce5-cda2ed9f3dcd

3.  Research best practices and recommended strategies and approaches for managing global supply chain risk

a.  10 Supply Chain Risk Management Best Practiceshttp://www.bankinfosecurity.com/10-supply-chain-risk-management-best-practices-a-5288/op-1

b.  Cyber Supply Chain Security: A Crucial Step Toward U.S. Security, Prosperity, and Freedom in Cyberspacehttp://www.heritage.org/research/reports/2014/03/cyber-supply-chain-security-a-crucial-step-toward-us-security-prosperity-and-freedom-in-cyberspace

c.  Managing Risk in Global ICT Supply Chains https://www.boozallen.com/content/dam/boozallen/media/file/managing-risk-in-global-ict-supply-chains-vp.pdf

d.  Supply Chain Risk Management Awareness  http://www.afcea.org/committees/cyber/documents/Supplychain.pdf

Write

1.  An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.

2.  A supply chain risks section in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.

3.  A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.

4.  A best practices section in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.

5.  A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.

Your five to eight page paper is to be prepared using basic APA formatting (including title page and reference list) and submitted as an MS Word attachment to the Industry Profile Part 2: Supply Chain Risk entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specific content and formatting requirements for this assignment.

3. 

Case Scenario:

For this case study, you are asked to (a) read the International Chamber of Commerce’s Cybersecurity Guide for Business and (b) watch three scenario segments from the “Scenario Based Planning” session at the 2015 Global Conference on Cyber Space. After you have done so, develop your answer to the question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies. Your task is to prepare a two to three page white paper which summarizes your response to the question. [This paper would be provided to session attendees in advance of the panel discussion.]

Research:

1.  Watch the Scenario Based Planning video from the 2015 Global Conference on Cyber Space https://www.youtube.com/watch?v=8kyj2HBqDyM

a.  Start of Session is at 5:05:00 on Live Stream Channel #1 (or click on “Scenario Based Planning” menu item in lower left hand corner of video at startup).

b.  The three “scenario videos” (approx. 6 mins each) occur at the following times in the livestream channel recording:

  i.  5:11:00 – 5:17:30

  ii.  5:35:30 – 5:41:30

  iii.  6:05:30 – 6:12:10

c.  End of Session is at 6:28:00

2.  Review the recommendations from the International Chamber of Commerce Cybersecurity Guide for Business http://www.iccwbo.org/Data/Documents/Digital-Economy/Cyber-Security-Guide-for-Business/ICC-Cyber-security-guide-for-business/

3.  Find three or more additional sources to support your answer to the case question.

Write:

Using standard terminology (see case study #1), write a two to three page response to the panel question. At a minimum, your summary must include the following:

1.  An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity challenges. This introduction should focus on political, economic, and social factors.

2.  A separate section in which you discuss the business need for cooperation on a global basis. This discussion should include examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces. Use the “global” companies from the Industry Profile Project as your examples. These companies include: Amazon, Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter, and Yahoo.

3.  A separate section in which you identify and discuss three or more specific cooperative efforts (e.g. alliances, associations, public/private partnerships) which currently exist. These may be industry specific, national, or international efforts.

4.  A closing section (“Recommendations”) in which you identify, discuss, and recommend three or more specific actions which global businesses as a whole can take to improve cooperation within and across industries for the purposes of addressing the cybersecurity challenges which you previously identified. This section should provide an overall answer to the general question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Submit For Grading & Discussion

1.  Submit your case study in MS Word format (.docx or .doc file) using the Case Study #4 Assignment in your assignment folder. (Attach the file.)

2.  Post your case study for discussion with your classmates. First, create a new topic in the Case Study #4 Discussion Forum. Then, paste the contents of your Case Study #4 document directly into that message. (Do not attach the file.)  

3.  Last posting or no posting for discussion will be penalized heavily so it is in your best interests to post your case study before the assigned due date.

Formatting Instructions

1.  Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Additional Information

1.  You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade.

2.  You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy.