Answer & Explanation:Running Case 4D: Running Case: Stratified Custom Manufacturing Drew Cubbins was not happy as he left the meeting. He often found himself in a bad mood after any meeting that involved attorneys. This event was no exception. SCM faced a civil suit from one of its business partners who claimed they were the victim of a cyber attack launched from yet another of SCM’s business partners. The firm initiating the suit was Bullard Enterprises, a subassembly parts supplier. The third party, Caldwell Supply, was the firm that was first completely compromised or pwned1 by the attackers and then whose systems and networks were used by the attackers to launch a second, more lucrative attack against Bullard Enterprises.Bullard Enterprises was suing SCM under the theory of downstream liability, claiming SCM should have enforced more stringent controls on the shared wide area network used by SCM and its various business partners. SCM had published a set of network-recommended practices for its vendor interconnection network, but these standards were only loosely enforced and no one could ever recall a potential business partner being denied access to the network for a failure to comply with the recommendations.Drew had just finished a meeting with his own lawyers in which they were attempting to craft a strategy for their defense in this suit. He was pretty sure they were going to lose the suit and pay substantial damages to Bullard. Now, his thoughts were on what to do with the vendor network and how to make it more secure without incurring too much in the way of expenses for that effort. It would no doubt require the buy-in from every one of the major suppliers and money and resources from SCM. He considered his options and then came to the conclusion that Takio Sumi, the CIO of SCM, would have to take point on this project.Please answer the following question below by providing your response:Pretend you are listening in on the meeting with Drew Cubbins and Takio Sumi. What would be the main points of the conversation?Main Point #1 — What steps need to be taken to ensure the network is more secure and the company no longer liable for damages? #2 — How much of these steps can be shared responsibilities with the partners? #3– How do we get the partner companies on board with SCM? #4 — What can be put in place to enforce compliance in the future?
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more