How Can U.S. Companies Protect their Digital Assets Overseas?

1. You have been invited to present your research concerning the question, (Is there a cybersecurity industry?) during a “lightning round” panel for your CTO’s monthly “brown bag” luncheon. The CTO sponsors these panels to help staff members learn more about technologies. The panels also provide an opportunity to develop “public speaking” skills.
To prepare for your presentation, you must write a 3 to 5 paragraph briefing statement in which you summarize your findings. This will be reviewed by the CTO before you give your presentation. Your briefing statement must provide:
An introduction to the topic that answers the question “What is an ‘industry?'”
Provide an analysis that discusses why market researchers treat cybersecurity as an “industry” but, the NAICS system does not.
Provide a summary & conclusions section in which you state your opinion as to whether or not cybersecurity should be assigned a unique NAICS code. Provide 3 supporting facts or reasons for your choice.
Provide in-text citations and references for 3 or more authoritative sources.
2. The PEST scan can be used by vendors (sellers) in an industry to identify current and emerging factors which drive customer demands and requirements for technologies, products, and services. Once the relevant market factors are identified, vendors can use this information to develop their strategies for meeting current and future demands for products and services.
In this debate, you will choose one PEST factor and argue as to why this is the most important source of customer requirements for IT security solutions (products or services). Present your argument in a 3 to 5 paragraph position paper. Your audience is a group of technical and non technical managers who are attending a monthly meeting to learn more about the cybersecurity / IT Security Industry.
The PEST factors are:
Political-Legal factors (e.g. laws & regulations, cybercrime, cyber terrorism)
Economic factors (e.g. availability of trained workforce, discretionary income or profitability of purchasers, availability of venture capital or credit for business startups)
Socio-cultural factors (privacy concerns, pervasiveness of computers and digital devices, digital divide, “hacker” culture)
Technological factors (product lifecycles, cloud computing, Internet of Things, etc.)
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.
3. Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas?
Prepare a 3 to 5 paragraph briefing statement that can be used to answer the above question. Your audience will be attendees at a conference for small business owners who are interested in expanding their footprint overseas (sales, offices, product development & manufacturing, etc.).
Provide in-text citations and references for 3 or more authoritative sources.

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: