Cyber Security
Cyber Security
Cyber Security
[Company address]
CYBER SECURITY
CONSULTING SERVICES
Business plan & feasibility report in perspective of
entrepreneurship
Contents
1.
Background.......................................................................................................... 3
2.
Opportunity analysis............................................................................................ 4
3.
Feasibility analysis............................................................................................... 5
3.1.
Environmental feasibility............................................................................... 5
3.2.
Product feasibility.......................................................................................... 6
3.3.
Financial feasibility......................................................................................... 8
4.
5.
Business lifecycle......................................................................................... 11
5.2.
Works Cited.............................................................................................................. 14
1. Background
Rapid evolution of technology is facing everyday more complex, new,
threatening, risk emerge and significantly harmful cyber security issues for
every organizations brand and bottom line. Cybersecurity attacks have been
increasing at an exponential rate since the last decade. The infiltration of an
organizations information and secured documents could be occurred for
weeks or even months ago while the organization would not have been
known to it. Organizations are bearing staggering cost when these
cybersecurity breaches do surface. Although organizations are addressing
this problem at the right priority but they are still vulnerable to cyberattacks. Hence, cybercrime or cyber security infringement can be defined as
the misuse of information system, data or cyberspace of any organization for
personal, economic or psychological gain. It includes hacking, botnets,
malware, phishing, online harassment, virtual cybercrime or any fraudulent
activity online. The US department of Defense (DoD) has been on the hit list
of cyber-attacks for years, for instance, in 1998 the Solar Sunrise cyberattacks was committed against the DoDs classified network. Similarly, UK
secretary of State for Defense has reported in 2011 that they are subject to
intense and significant issues of cyberattacks on every day basis. The
department reported that they have identified and disrupted over one
thousand attempts which were made seriously to breach the computer
network to gat secured information.
In April, 2011 a cyber-attack has been experienced b Sonys PlayStation
network which was targeted to steel the personal data of its users. It has
been reported by Sony Inc. that over 77 million accounts were compromised
with the largest data loss so far by the company. Similarly, Sony online
entertainment network has been attacked affecting more than 24 million
customer records switching the attention towards the vulnerability of big
organization through cybercrimes and hacking. An example of phishing is the
Nigerian 419 scam which is comprised of the situation in which millions of
of
ADM,
implementation
of
artificial
intelligence
enables
the
technology
system.
Mobile
security
and
services
for
Annual
Annual 109
91,765,453
Monthly
Monthly, 1, 405
Monthly 9
7,647,121
Weekly
Weekly 324
Weekly 2
1,746,720
Table
I:
security
and
artificial
intelligence
events
and
with Cost
respect to region
United States
Germany
Brazil
India
per
cyber-attack/
loss of information
$ 5.9 million
$ 4.7 million
$ 1.6 million
$ 1.4 million
Fig
I:
The
financial
and
manufacturing
industries
are
highly
vulnerable to cyber-attacks
3.2.
feasibility
The categories
Product
which
company
the
of incidents for
been aimed to
provide
security
solution
described in the
following
figure.
incidents
These
happening
in
the
has
are
are
financial
Fig II: Malicious and Scan problems are at the top of the list
assessed globally
Above mentioned cyber security issues are facing by the organization
operating in any kind of industry relating to any size or operations of the
organization. Hence, the company is intended to provide the consulting
services to deal with these cyber security issues. These consulting services
would be comprised of the tools and programs for the implementation of risk
management, vulnerably management, asset discovery and management,
mobile security and development of secure operation centers for the
organization related to the financial and manufacturing industries at priority
(Grimes, 2013). Traditional security defenses employed by the organization
with the help of IT tools are now out of date and the organizations are
demanding to implement artificial intelligence tools to gauge and identify the
risk associated to their operations, assets and processes in order to protect
the intellectual property and customers database. With the changing
practices and business horizons, companies need to gather data of their
customers to personalize and customize the marketing messages in order to
get competitive advantage over other (Holm, 2006). It can only be achieved
if the company is able to secure the data of its customer which would pay
heavy cost otherwise in case of breach of information. Hence, the future of
feasibility of cyber security products puts greater emphasize on the
Charges/
1
2
3
month
Risk management
$ 400
Risk management (internal & external audit)
$ 500
Risk management and implementation of artificial $ 450
intelligence
Mobile security
5
6
protection)
Operating system security
Vulnerability management
(scam,
malware
(mobile
and
hacking $ 300
$ 300
operating $ 800
overall security)
Development of secure operations center
$ 1000
$ 1000
Table III: Services offered and the charges to the client company
Above is the consulting fee which the company would charge to every client
according to the services that company would be willing to acquire. The
company would charge the client company on monthly basis for the
acquisition of these consulting services. Prices have been kept enough
competitive regarding the market prices and suites offered by other
companies.
4. Strategic positioning and Business model
Key partners: The Company would have strategic alliance with the IT
companies, software and hardware vendors, software developers, internal
and external IT auditors, financial experts and other IT companies. For the
rendering of services mentioned in the Table III, the company would have
partnership with these companies to provide prompt and reliable solutions.
Key partnership with these companies is essential to provide a full suite of
capabilities and IT security services (Holm, 2006).
Key
activities:
Internal
and
external
auditing,
risk
management,
needs
customer
relationship
management
and
integrated
Value proposition:
Key resources
Human capital
Security card
developers
Consultants
IT companies
practices
Internal &
external
auditors
Customer relationship
management
Integrated
marketing
communication
Value
proposition
A combination of IT
security solutions and
cyber
security
consultation with an
innovative approaches
and industrys best
practices will deliver
services
with
continuing values.
Responsive,
cost-
Customer
segment
Firms operating in
financial and
manufacturing
industries
Catering small,
medium and large
organizations on the
basis of their
operations
Key activities
effective,
reliable
Distribution
services delivery and
Software/ channels
Relationship
consultation
hardware
Costs:
costs includedevelopment
fixed, initial with
investment to
Revenues: The clients would
Offline (small &
vendors
Latest be
technology
to
distributors, huge cost would
initiate
the business. Additionally,
be charged
on monthly basis.
regional level
ensure
network
incurred for organizations)
suppliers
of requited
andconsultancy
Hence, the revenue would be
Financial the procurement
resilience & dedication
staff, software, tools customers
and programs, hardware
and
to
clients collected
mission after rendering the
experts
& cloud channels. Afterwards,
developmentOnline
of (SaaS
distribution
service for a month. The
success
Procurement
of respect to
computing)
small variable
cost would
be incurred with
pricing strategy has been
Proactive
risk
software
and
clients.
described in Table III.
5.1.
Business lifecycle
Our company is at the first step of business lifecycle i.e. startup phase which
has been associated to numerous challenges and problems for product
development and market penetration (Venkatraman & V, 2006). Through the
literature available on the cyber security consulting market, it can be said
that the industry is at growth stage which requires serious attempts to enter
into the market and introduce a company as a brand fro market penetration
and to get a competitive advantage (Verhoef, 2003). The market situation
depicts the high demand of security products and vulnerability solutions
where organizations are looking for solution to create and internally audit
security policy, proactive mitigation of cyber risks, consolidation of risk
management and mitigation process and ultimate provision of cyber security
solutions (Reid, 2005). The market of cyber security consulting services has
seen growth of 17 % since 2010 because of the ever increasing cyber cries
and cyber-attacks on well-known organizations including Sony Inc. With over
50 well known vendors, the total market was about 3.4 billion dollar
increasing at exponential rate of 17 % annually. Hence, to start a business in
highly progressing and demanding market is comparatively easy however, in
the market of active participants such as IBM, the company faces many
challenges. In the complex and competitive market of cyber security
consulting, the company is facing issues to procure information for product
development as well as bargaining power of suppliers is another issue. Due
to the presence of large 50 vendors occupying the market at global level,
suppliers has inelastic demand of prices which incurs high investment cost at
initial level (Porter, 2008). Absence of information leads to the procurement
and establishment of relationship with the clients who are bound to reliable
and already established relationship with big consulting organizations such
as IBM . The competition is stiffened which is quite challenging at the initial
level of business however, the company is able to acquire regional and local
client company to initiate its business which is a favorable factors.
Absence
of
information
for
product
development
High competition
Saturated market
with few giant
consulting
companies
like
IBM
at growth stage. Hence the critical success factors have been summarized as
below.
Functional
1
area
Marketing
sales
Success factors
and The company is in dire need of establishment of
brand awareness campaigns to compete with other
companies as well as to establish integrated
marketing
communication
and
customer
Finance
R&D
Human
satisfy customers.
To lead in consultancy business, company needs to
resource
Focus area
Production
success.
To match with the needs of market, the company
should pay attention to the product development
and increased production capability.
Works Cited
Adamson, I., 2013. Relationship marketing: customer commitment and trust
as a strategy for the smaller Hong Kong corporate banking sector..
International journal of bank marketing.
Birley, S., 2000. Entrepreneurial networks: their emergence in Ireland and
overseas. International Small Business Journal.
Burt, R., 2000. The network entrepreneur. Entrepreneurship: The social
science view, pp. 281-307.
Cant, M., 2009. Marketing Management. Juta Publications.
Chen, C., 2007. Marketing communication strategies in support of product
launch: An empirical study of Taiwanese high-tech firms. Industrial Marketing
Management, pp. 1046-1056.
Chen, K. H., 2012. The impact of Customer Knowledge Enabled Innovation
Capability, Learning Orientation, Supervisor Support on Organizational
Performance. Journal of Business Management , pp. 11-14.
Chen, Y., 2008. Online consumer review: Word-of-mouth as a new element of
marketing communication mix. Management Science, pp. 477-491.
Dodd,
S.,
2002.
National
differences
in
entrepreneurial
networking.
Grimes,
M.,
2013.
Studying
the
origins
of
social
entrepreneurship:
B.,
1988.
Business
formationa
network
approach.
spatial
and
functional
patterns.
Entrepreneurship
&
Regional
strategies in
marketing
channels: A
A.,
2005.
strategic
framework
for
customer
relationship
M.,
2005.
The
relationship
between
integrated
marketing
through
customer
relationship
management.
European
management journal.
Shimp, T., 1997. Advertising, promotion, and supplemental aspects of
integrated marketing communications. Harcourt Brace College Publishers..
Venkatraman, N. & V, R., 2006. Measurement of business performance in
Strategy research: a Comparison of approaches. Academy of Management
Review, Volume 11, pp. 810-814.
Verhoef, P., 2003. Understanding the effect of customer relationship
management
efforts
on
customer
retention
and
customer
share