SlideShare a Scribd company logo
Buy here:
http://theperfecthomework.com/csia-360-case-study-4-w
hy-should-businesses-participate-in-public-private-partn
erships-for-cybersecurity/
CASE STUDY #4: WHY SHOULD BUSINESSES PARTICIPATE IN PUBLIC-PRIVATE
PARTNERSHIPS FOR CYBERSECURITY?
CASE SCENARIO:
A large regional utility company has been approached by a federally funded research
and development organization (FFRDC) which is recruiting companies for
participation in a government initiated public-private partnership designed to improve
cybersecurity for the energy sector. The utility distributes both natural gas and
electricity across a three state area that includes both urban and rural households
and businesses. The utility company’s board of directors is not familiar with the
concept of public-private partnerships. They have hired your small consulting firm to
help them make an informed decision. Their biggest question is “What’s in this for
us?” The second looming question is what types of resources would they be
expected to contribute to the effort (e.g. money, personnel, facilities)?
Your immediate (quick response) task is to research and write a three page issues
brief which addresses public-private partnerships, the types of cybersecurity
improvements which could be addressed by such a partnership, the potential benefits
to industry partners, and the potential risks and/or costs in resources.
Please note: if you have written a similar paper or assignment for other courses, you
may consult that work but you may NOT reuse it. You must write a new white paper
that specifically addresses the requirements of this assignment.
RESEARCH:
1. 1. Read / Review the Week 7 readings.
2. 2. Research the concepts and structures for public-private partnerships as
a means of furthering public policy goals. Your starting resources are:
1. a. ​What are Public Private Partnerships​ (World Bank)
http://ppp.worldbank.org/public-private-partnership/overview/what
-are-public-private-partnerships
2. b. ​The Policy
Cycle​ http://www.policynl.ca/policydevelopment/policycycle.html
3. 3. Research existing or proposed public-private partnerships in
cybersecurity and critical infrastructure protection. Here are some
sources to get you started:
1. a.
http://www.insaonline.org/CMDownload.aspx?ContentKey=e1f31b
e3-e110-41b2-aa0c-966020051f5c&ContentItemKey=161e015c-670f-
449a-8753-689cbc3de85e
2. b.
http://www.lawandsecurity.org/Portals/0/Documents/Cybersecurity
.Partnerships.pdf
3. c. ​http://csis.org/files/publication/130819_tech_summary.pdf
4. d.
http://www.hsgac.senate.gov/hearings/strengthening-public-privat
e-partnerships-to-reduce-cyber-risks-to-our-nations-critical-infrast
ructure
5. e.
http://www.hsgac.senate.gov/download/?id=66d59b29-25ac-4dc1-a
3af-040dcfe3bd38
6. f.
http://www.hsgac.senate.gov/download/?id=5a70808b-ff76-411d-90
75-5b21c7398bf5
4. 4. Research the DHS led public-private partnership for Critical
Infrastructure Cybersecurity improvements. You should also review the
requirements and provisions of the NIST Cybersecurity Framework for
Critical Infrastructure Protection. Find out why DHS is encouraging the
adoption of this framework.
1. a.
http://www.dhs.gov/blog/2014/02/12/dhs-launches-c%C2%B3-volu
ntary-program
2. b. ​https://www.us-cert.gov/ccubedvp
3. c.
https://www.us-cert.gov/sites/default/files/c3vp/ccubedvp-outreac
h-and-messaging-kit.pdf
5. 5. Find additional sources which provide information about public-private
partnerships for cybersecurity, i.e. Information Sharing and Analysis
Centers (ISACs) or Information Sharing and Analysis Organizations. Here
are two overview /directory web pages to help you get started.
1. a. ​http://www.dhs.gov/isao
2. b. ​http://www.isaccouncil.org/memberisacs.html
WRITE:
Write a two to three page summary of your research. At a minimum, your summary
must include the following:
1. 1. An introduction or overview for public-private partnershipswhich
provides definitions and addresses the laws, regulations, and policies
which permit this type of cooperation between federal, state, and local
governments and private companies such as your customer (the utility
company). This introduction should be suitable for an executive audience.
2. 2. A separate section which provides an overview of public-private
partnerships for cybersecurity which addresses the types of activities
which the utility company could reasonably be expected to contribute to
(cybersecurity activities for energy sector critical infrastructures). You
should provide 3 or more specific examples.
3. 3. An analysis of whether or not participation in a public-private
partnership is likely to have benefits for the utility company (with specific
examples of those benefits). After you address the benefits, address the
problem of costs and/or risks which the company could expect to face
(with specific examples). (One risk to consider is how much information
about company operations could be exposed to the federal government.)
4. 4. A recommendation with justification or rationale for which, if any,
existing or proposed public-private partnerships the utility company
should consider participating in.
Your white paper should use standard terms and definitions for cybersecurity and
privacy. The following source is recommended:
● NICCS Glossary ​http://niccs.us-cert.gov/glossary
SUBMIT FOR GRADING & DISCUSSION
1. 1. Submit your case study in MS Word format (.docx or .doc file) using the
Case Study #1 Assignment in your assignment folder. (Attach the file.)
2. 2. Post your case study for discussion with your classmates. First, create
a new topic in the Case Study #1 Discussion Forum. Then, paste the
contents of your Case Study #1 document directly into that message. (Do
not attach the file.)
3. 3. Late posting or no posting for discussion will be penalized heavily so it
is in your best interests to post your case study before the assigned due
date.
4. 1. Use standard APA formatting for the MS Word document that you
submit to your assignment folder. Formatting requirements and examples
are found under Course Resources > APA Resources.
5. 2. Use the “Paste from Word” paste option in the LEO editor when posting
your Case Study to the Case Study #1 Discussion forum.
6. 1. You are expected to write grammatically correct English in every
assignment that you submit for grading. Do not turn in any work without
(a) using spell check, (b) using grammar check, (c) verifying that your
punctuation is correct and (d) reviewing your work for correct word usage
and correctly structured sentences and paragraphs. These items are
graded under Professionalism and constitute 20% of the assignment
grade.
7. 2. You are expected to credit your sources using in-text citations and
reference list entries. Both your citations and your reference list entries
must comply with APA 6th edition Style requirements. Failure to credit
your sources will result in penalties as provided for under the university’s
Academic Integrity policy.
FORMATTING INSTRUCTIONS
ADDITIONAL INFORMATION

More Related Content

Viewers also liked

HTS Howden High 5 Award
HTS Howden High 5 AwardHTS Howden High 5 Award
HTS Howden High 5 AwardGordon Abraham
 
Truck Certifikat
Truck CertifikatTruck Certifikat
Truck CertifikatJohnni T
 
Javela Singleton Word 2013 Certificate
Javela Singleton Word 2013 CertificateJavela Singleton Word 2013 Certificate
Javela Singleton Word 2013 CertificateJavela Singleton
 
¿POR QUE ES NECESARIO MANTENER LAS APLICACIONES DE SEGURIDAD ACTIVADAS Y ACTU...
¿POR QUE ES NECESARIO MANTENER LAS APLICACIONES DE SEGURIDAD ACTIVADAS Y ACTU...¿POR QUE ES NECESARIO MANTENER LAS APLICACIONES DE SEGURIDAD ACTIVADAS Y ACTU...
¿POR QUE ES NECESARIO MANTENER LAS APLICACIONES DE SEGURIDAD ACTIVADAS Y ACTU...
Williamwec
 
Ciutadaniacotxes
CiutadaniacotxesCiutadaniacotxes
CiutadaniacotxesMariiia1123
 
Visual basic-60-navarra(1)
Visual basic-60-navarra(1)Visual basic-60-navarra(1)
Visual basic-60-navarra(1)
franco reyes
 
Relevo do brasil
Relevo do brasilRelevo do brasil
Relevo do brasil
Colégio Nova Geração COC
 

Viewers also liked (20)

JordynResume
JordynResumeJordynResume
JordynResume
 
20150722154446782
2015072215444678220150722154446782
20150722154446782
 
Certificate-Silber_Ögussa
Certificate-Silber_ÖgussaCertificate-Silber_Ögussa
Certificate-Silber_Ögussa
 
bolles
bollesbolles
bolles
 
HTS Howden High 5 Award
HTS Howden High 5 AwardHTS Howden High 5 Award
HTS Howden High 5 Award
 
Degree-rotated
Degree-rotatedDegree-rotated
Degree-rotated
 
MikeOL1a
MikeOL1aMikeOL1a
MikeOL1a
 
Mymap
MymapMymap
Mymap
 
Clinic Postcard
Clinic PostcardClinic Postcard
Clinic Postcard
 
Truck Certifikat
Truck CertifikatTruck Certifikat
Truck Certifikat
 
Test
TestTest
Test
 
lattimer_m_baby
lattimer_m_babylattimer_m_baby
lattimer_m_baby
 
Javela Singleton Word 2013 Certificate
Javela Singleton Word 2013 CertificateJavela Singleton Word 2013 Certificate
Javela Singleton Word 2013 Certificate
 
¿POR QUE ES NECESARIO MANTENER LAS APLICACIONES DE SEGURIDAD ACTIVADAS Y ACTU...
¿POR QUE ES NECESARIO MANTENER LAS APLICACIONES DE SEGURIDAD ACTIVADAS Y ACTU...¿POR QUE ES NECESARIO MANTENER LAS APLICACIONES DE SEGURIDAD ACTIVADAS Y ACTU...
¿POR QUE ES NECESARIO MANTENER LAS APLICACIONES DE SEGURIDAD ACTIVADAS Y ACTU...
 
Ciutadaniacotxes
CiutadaniacotxesCiutadaniacotxes
Ciutadaniacotxes
 
Apresentação1
Apresentação1Apresentação1
Apresentação1
 
IMG_0019
IMG_0019IMG_0019
IMG_0019
 
lattimer_m_birds
lattimer_m_birdslattimer_m_birds
lattimer_m_birds
 
Visual basic-60-navarra(1)
Visual basic-60-navarra(1)Visual basic-60-navarra(1)
Visual basic-60-navarra(1)
 
Relevo do brasil
Relevo do brasilRelevo do brasil
Relevo do brasil
 

Similar to CSIA 360 CASE STUDY #4 WHY SHOULD BUSINESSES PARTICIPATE IN PUBLIC-PRIVATE PARTNERSHIPS FOR CYBERSECURITY

Cis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer newCis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer new
LindaAdams2017
 
Technology & Product Review for Identity Governance & Administration.docx
Technology & Product Review for Identity Governance & Administration.docxTechnology & Product Review for Identity Governance & Administration.docx
Technology & Product Review for Identity Governance & Administration.docx
jacqueliner9
 
Case scenario a membership organization/tutorialoutlet
Case scenario a membership organization/tutorialoutletCase scenario a membership organization/tutorialoutlet
Case scenario a membership organization/tutorialoutlet
Lunness
 
Concert Calendar Websites (2 pages)Look specifically for free co.docx
Concert Calendar Websites (2 pages)Look specifically for free co.docxConcert Calendar Websites (2 pages)Look specifically for free co.docx
Concert Calendar Websites (2 pages)Look specifically for free co.docx
maxinesmith73660
 
Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
annrodgerson
 
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
JanuMorandy
 
7Crisis Response PortfolioYour NameWalden Univer.docx
7Crisis Response PortfolioYour NameWalden Univer.docx7Crisis Response PortfolioYour NameWalden Univer.docx
7Crisis Response PortfolioYour NameWalden Univer.docx
sleeperharwell
 
Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
sholingarjosh61
 
Cis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.com
Stephenson03
 
CSIA 300 Cybersecurity for Leaders and Managers Researc
CSIA 300 Cybersecurity for Leaders and Managers ResearcCSIA 300 Cybersecurity for Leaders and Managers Researc
CSIA 300 Cybersecurity for Leaders and Managers Researc
MargenePurnell14
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
Robinson068
 
Final Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docxFinal Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docx
lmelaine
 
Template for Career Development PlanIntroductionIn this sectio.docx
Template for Career Development PlanIntroductionIn this sectio.docxTemplate for Career Development PlanIntroductionIn this sectio.docx
Template for Career Development PlanIntroductionIn this sectio.docx
bradburgess22840
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
robertlesew96
 

Similar to CSIA 360 CASE STUDY #4 WHY SHOULD BUSINESSES PARTICIPATE IN PUBLIC-PRIVATE PARTNERSHIPS FOR CYBERSECURITY (14)

Cis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer newCis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer new
 
Technology & Product Review for Identity Governance & Administration.docx
Technology & Product Review for Identity Governance & Administration.docxTechnology & Product Review for Identity Governance & Administration.docx
Technology & Product Review for Identity Governance & Administration.docx
 
Case scenario a membership organization/tutorialoutlet
Case scenario a membership organization/tutorialoutletCase scenario a membership organization/tutorialoutlet
Case scenario a membership organization/tutorialoutlet
 
Concert Calendar Websites (2 pages)Look specifically for free co.docx
Concert Calendar Websites (2 pages)Look specifically for free co.docxConcert Calendar Websites (2 pages)Look specifically for free co.docx
Concert Calendar Websites (2 pages)Look specifically for free co.docx
 
Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
 
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
 
7Crisis Response PortfolioYour NameWalden Univer.docx
7Crisis Response PortfolioYour NameWalden Univer.docx7Crisis Response PortfolioYour NameWalden Univer.docx
7Crisis Response PortfolioYour NameWalden Univer.docx
 
Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
 
Cis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.com
 
CSIA 300 Cybersecurity for Leaders and Managers Researc
CSIA 300 Cybersecurity for Leaders and Managers ResearcCSIA 300 Cybersecurity for Leaders and Managers Researc
CSIA 300 Cybersecurity for Leaders and Managers Researc
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
 
Final Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docxFinal Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docx
 
Template for Career Development PlanIntroductionIn this sectio.docx
Template for Career Development PlanIntroductionIn this sectio.docxTemplate for Career Development PlanIntroductionIn this sectio.docx
Template for Career Development PlanIntroductionIn this sectio.docx
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 

Recently uploaded

Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
daothibichhang1
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
Allensmith572606
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 

Recently uploaded (20)

Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 

CSIA 360 CASE STUDY #4 WHY SHOULD BUSINESSES PARTICIPATE IN PUBLIC-PRIVATE PARTNERSHIPS FOR CYBERSECURITY

  • 1. Buy here: http://theperfecthomework.com/csia-360-case-study-4-w hy-should-businesses-participate-in-public-private-partn erships-for-cybersecurity/ CASE STUDY #4: WHY SHOULD BUSINESSES PARTICIPATE IN PUBLIC-PRIVATE PARTNERSHIPS FOR CYBERSECURITY? CASE SCENARIO: A large regional utility company has been approached by a federally funded research and development organization (FFRDC) which is recruiting companies for participation in a government initiated public-private partnership designed to improve cybersecurity for the energy sector. The utility distributes both natural gas and electricity across a three state area that includes both urban and rural households and businesses. The utility company’s board of directors is not familiar with the concept of public-private partnerships. They have hired your small consulting firm to help them make an informed decision. Their biggest question is “What’s in this for us?” The second looming question is what types of resources would they be expected to contribute to the effort (e.g. money, personnel, facilities)? Your immediate (quick response) task is to research and write a three page issues brief which addresses public-private partnerships, the types of cybersecurity improvements which could be addressed by such a partnership, the potential benefits to industry partners, and the potential risks and/or costs in resources. Please note: if you have written a similar paper or assignment for other courses, you may consult that work but you may NOT reuse it. You must write a new white paper that specifically addresses the requirements of this assignment. RESEARCH: 1. 1. Read / Review the Week 7 readings. 2. 2. Research the concepts and structures for public-private partnerships as a means of furthering public policy goals. Your starting resources are: 1. a. ​What are Public Private Partnerships​ (World Bank) http://ppp.worldbank.org/public-private-partnership/overview/what -are-public-private-partnerships 2. b. ​The Policy Cycle​ http://www.policynl.ca/policydevelopment/policycycle.html
  • 2. 3. 3. Research existing or proposed public-private partnerships in cybersecurity and critical infrastructure protection. Here are some sources to get you started: 1. a. http://www.insaonline.org/CMDownload.aspx?ContentKey=e1f31b e3-e110-41b2-aa0c-966020051f5c&ContentItemKey=161e015c-670f- 449a-8753-689cbc3de85e 2. b. http://www.lawandsecurity.org/Portals/0/Documents/Cybersecurity .Partnerships.pdf 3. c. ​http://csis.org/files/publication/130819_tech_summary.pdf 4. d. http://www.hsgac.senate.gov/hearings/strengthening-public-privat e-partnerships-to-reduce-cyber-risks-to-our-nations-critical-infrast ructure 5. e. http://www.hsgac.senate.gov/download/?id=66d59b29-25ac-4dc1-a 3af-040dcfe3bd38 6. f. http://www.hsgac.senate.gov/download/?id=5a70808b-ff76-411d-90 75-5b21c7398bf5 4. 4. Research the DHS led public-private partnership for Critical Infrastructure Cybersecurity improvements. You should also review the requirements and provisions of the NIST Cybersecurity Framework for Critical Infrastructure Protection. Find out why DHS is encouraging the adoption of this framework. 1. a. http://www.dhs.gov/blog/2014/02/12/dhs-launches-c%C2%B3-volu ntary-program 2. b. ​https://www.us-cert.gov/ccubedvp 3. c. https://www.us-cert.gov/sites/default/files/c3vp/ccubedvp-outreac h-and-messaging-kit.pdf 5. 5. Find additional sources which provide information about public-private partnerships for cybersecurity, i.e. Information Sharing and Analysis Centers (ISACs) or Information Sharing and Analysis Organizations. Here are two overview /directory web pages to help you get started. 1. a. ​http://www.dhs.gov/isao 2. b. ​http://www.isaccouncil.org/memberisacs.html WRITE: Write a two to three page summary of your research. At a minimum, your summary must include the following: 1. 1. An introduction or overview for public-private partnershipswhich provides definitions and addresses the laws, regulations, and policies which permit this type of cooperation between federal, state, and local
  • 3. governments and private companies such as your customer (the utility company). This introduction should be suitable for an executive audience. 2. 2. A separate section which provides an overview of public-private partnerships for cybersecurity which addresses the types of activities which the utility company could reasonably be expected to contribute to (cybersecurity activities for energy sector critical infrastructures). You should provide 3 or more specific examples. 3. 3. An analysis of whether or not participation in a public-private partnership is likely to have benefits for the utility company (with specific examples of those benefits). After you address the benefits, address the problem of costs and/or risks which the company could expect to face (with specific examples). (One risk to consider is how much information about company operations could be exposed to the federal government.) 4. 4. A recommendation with justification or rationale for which, if any, existing or proposed public-private partnerships the utility company should consider participating in. Your white paper should use standard terms and definitions for cybersecurity and privacy. The following source is recommended: ● NICCS Glossary ​http://niccs.us-cert.gov/glossary SUBMIT FOR GRADING & DISCUSSION 1. 1. Submit your case study in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach the file.) 2. 2. Post your case study for discussion with your classmates. First, create a new topic in the Case Study #1 Discussion Forum. Then, paste the contents of your Case Study #1 document directly into that message. (Do not attach the file.) 3. 3. Late posting or no posting for discussion will be penalized heavily so it is in your best interests to post your case study before the assigned due date. 4. 1. Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources. 5. 2. Use the “Paste from Word” paste option in the LEO editor when posting your Case Study to the Case Study #1 Discussion forum. 6. 1. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 20% of the assignment grade. 7. 2. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries
  • 4. must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy. FORMATTING INSTRUCTIONS ADDITIONAL INFORMATION