It is essential to address cyber risk during requirement definition and solution analysis in the first step to acquisition alignment. based on the organizational cybersecurity requirements, acquisition personnel and requirement developer should determine the control to be included in the requirement, identify critical decisions to the acquisition, and key stakeholders and the cybersecurity management plan are included in critical decisions (Snyder et al., 2019). The second step in acquisition alignment involves acquisition personnel certifying that cybersecurity requirements are included in the solicitation (Mbanaso et al., 2019). Thus, technical requirements, criteria of source selection, pricing methodology, and application of post-award contract administration are included.
The third step in acquisition alignment involves the participation of the acquisition manager in the process of proposal evaluation during the source selection process. The involvement of the acquisition personnel is to ensure that the apparent best value proposal meeting solicitation requirements for the cybersecurity need (Mbanaso et al., 2019). Lastly, it is important to note that measures of managing supply chain risk, conformance testing, matters of post-award contract performance, and review of technology refreshes are critical during acquisition (Mbanaso et al., 2019). therefore, the responsible personnel like the program manager with assistance from the acquisition should certify that the activities were carried out in accordance to laid organizational standards, regulations, and policies.
In conclusion, the achievement of resilience in cybersecurity requires investment in resources and personnel needed to carry out risk management. Also, interagency coordination is required between stakeholders and supply chain providers and suppliers. Besides, people in leadership should be aware of the issues concerning cybersecurity (Ammirato et al., 2019). Thus, organizations should ensure that they carry out the acquisition processes thoughtfully and collaboratively and by ensuring that all affirmative steps to minimize the adverse impact of incidences are included in solutions.
References
Ammirato, S., Sofo, F., Felicetti, A. M., & Raso, C. (October 14, 2019). The potential of IoT in redesigning the bank branch protection system. Business Process Management Journal, 25, 7, 1441-1473.
Mbanaso, U. M., Apene, O. Z., & Abrahams, L. (September 12, 2019). Conceptual design of a Cybersecurity Resilience Maturity Measurement (CRMM) Framework. The African Journal of Information and Communication, 2019, 23, 1-26.Snyder, D., Rand Corporation, & Project Air Force (U.S.). (2015). Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more