SCRM best practices—Identify best practices and successful implementation.
Describe supply chain risk management practices and the software risk analysis process. SCRM threats—List and describe supply-chain cybersecurity threats and the technologies and policies that can be used to mitigate the threats. SCRM challenges—Determine the SCRM challenges in your organization given its business and culture and the concerns that John cited during your meeting. Evaluate the various approaches to developing secure code in a cost-effective manner in light of your organization’s Software Assurance needs and expectations, software assurance objectives, and software assurance coding and development plan. You will want to optimize the effectiveness of your software procurement by addressing early on your organization’s information security requirements and risk management in the supply chain germane to your workplace. You will use this information throughout the project and to help you create the presentation slide deck. Step 2: Presentation Slide Deck Using the information that you obtained in Step 1, develop a slide deck with a minimum of six slides. John will include these slides in his final presentation to educate his audience on SCRM. These slides should identify the key concepts, considerations, and applicability of SCRM for your organization.
Leave a Reply
Want to join the discussion?Feel free to contribute!