Expert answer:How can we improve global cooperation to respond to cybersecurity challenges in cyberspace? Case Scenario: For this case study, you are asked to (a) read the International Chamber of Commerce’s Cybersecurity Guide for Business and (b) watch three scenario segments from the “Scenario Based Planning” session at the 2015 Global Conference on Cyber Space. After you have done so, develop your answer to the question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace? Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies. Your task is to prepare a two to three page white paper which summarizes your response to the question. [This paper would be provided to session attendees in advance of the panel discussion.] Research: Watch the Scenario Based Planning video from the 2015 Global Conference on Cyber Space https://www.youtube.com/watch?v=8kyj2HBqDyMStart of Session is at 5:05:00 on Live Stream Channel #1 (or click on “Scenario Based Planning” menu item in lower left hand corner of video at startup).The three “scenario videos” (approx. 6 mins each) occur at the following times in the livestream channel recording:i.5:11:00 – 5:17:30ii.5:35:30 – 5:41:30iii.6:05:30 – 6:12:10End of Session is at 6:28:00 Review the recommendations from the International Chamber of Commerce Cybersecurity Guide for Business https://cdn.iccwbo.org/content/uploads/sites/3/201… Find three or more additional sources to support your answer to the case question. Write: Using standard terminology (see case study #1), write a two to three page response to the panel question. At a minimum, your summary must include the following: 1.An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity challenges. This introduction should focus on political, economic, and social factors. 2.A separate section in which you discuss the business need for cooperation on a global basis. This discussion should include examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces. Use the “global” companies from the Industry Profile Project as your examples. These companies include: Amazon, Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter, and Yahoo. 3.A separate section in which you identify and discuss three or more specific cooperative efforts (e.g. alliances, associations, public/private partnerships) which currently exist. These may be industry specific, national, or international efforts. 4.A separate section (“Recommendations”) in which you identify, discuss, and recommend three or more specific actions which global businesses as a whole can take to improve cooperation within and across industries for the purposes of addressing the cybersecurity challenges which you previously identified. This section should provide an overall answer to the general question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace? 5.A separate closing section in which you summarize the issues and recommendations for improving global cooperation to respond to cybersecurity challenges in cyberspace. MUST MEET THESE REQUIREMENTSIntroduction or Overview for the Case Study Provided an excellent introduction, which addressed the reasons why cooperation on a global basis is required to address cybersecurity challenges. Addressed 3 or more specific political, economic, and social factors which drive global society’s need for cooperation. Used information from 3 or more authoritative sources. Business Need for Global Cooperation on Cybersecurity Provided an excellent discussion of the business need for cybersecurity related cooperation on a global basis. This discussion included 3 or more examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces. Used information from 3 or more authoritative sources. Identified and Discussed Existing Cybersecurity Cooperative Efforts Provided an excellent discussion of three or more specific cybersecurity cooperative efforts (industry, national, international) which currently exist. Provided URLs and information about the membership, membership requirements, mission, and functions for each alliance, association, or public/private partnership.Used information from 3 or more authoritative sources. Recommendations for Improving Global Cooperation for Cybersecurity Provided an excellent set of recommendations for improving global cooperation in response to cybersecurity challenges in cyberspace. Included three or more specific actions, which global businesses as a whole can take to improve cooperation within and across industries. Answered the case question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace. Used information from 3 or more authoritative sources. Summary of Issues and Recommendations Provided an excellent summary of the issues and recommendations for improving cooperation within and across industries to address cybersecurity challenges in cyberspace. The summary should be clear, concise, and accurate. Used information from authoritative sources. Both citations and reference list entries must comply with APA 6th edition Style requirements
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more