Y​‌‍‍‍‌‍‍‍‌‍‍‍‌‌‌‌‌‌‍‍​ou have been invited to participate in a round table discussion on the above topic at a conference on Best Practices for IT Security Management. 

For this activity you must prepare a 3 to 5 paragraph briefing statement which answers the following questions. You must use and cite information from the weekly readings.

 What is stakeholder theory? 

How does it drive requirements to spend money on cybersecurity products & services?

 Ho​‌‍‍‍‌‍‍‍‌‍‍‍‌‌‌‌‌‌‍‍​w does social contract theory apply to purchasing requirements for cybersecurity products & services? 

Name and briefly describe 3 ethics issues that IT Security managers and staff may encounter when selecting and evaluating cybersecurity products & services. (Use examples to drive home your points.) 

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting​‌‍‍‍‌‍‍‍‌‍‍‍‌‌‌‌‌‌‍‍​.