The New York Advisory Group, LLC
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

  • Home
  • Services
  • Expertise
  • Approach
  • Research
  • About NYAG
  • More
    • Home
    • Services
    • Expertise
    • Approach
    • Research
    • About NYAG
The New York Advisory Group, LLC

Signed in as:

filler@godaddy.com

  • Home
  • Services
  • Expertise
  • Approach
  • Research
  • About NYAG

Account


  • Bookings
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • My Account

NYAG Research and Insights

nYAG research and insights

Domains of Expertise

In today's competitive market, a strategic edge is essential. NYAG helps you gain that advantage with specialized industry research and actionable insights across key domains, including:

  • Cybersecurity
  • Artificial Intelligence
  • Regulatory Compliance
  • Organizational Transformation
  • Strategic Intelligence
  • Leadership
  • Accessibility & Inclusion


NYAG provides customized insight to help your organization identify emerging trends, understand market dynamics, and make data-driven decisions. Integrating business strategy consulting services, NYAG's insights drive sustainable growth and give you the competitive edge you need.


Unleash the power of your message. Contact NYAG to articulate your organization's strategic intelligence with tailored research writing services that resonate with your customers, market peers, and employees. 

research & insights - Q3 / Q4 2025

RESEARCH and insight, organizational strategy

Navigating Competitive Landscapes: Leveraging Blue Ocean Strategy and Porter's Five Forces for IT

Abstract

This document explores two strategic frameworks: the Blue Ocean Strategy and Porter's Five Forces Model. The Blue Ocean Strategy encourages businesses to create new, uncontested market spaces to drive innovation and reduce competition, while Porter's Five Forces Model provides a robust framework for analyzing the competitive dynamics within existing markets. By leveraging both frameworks, technology businesses can navigate competitive landscapes and identify opportunities for growth and market leadership.


Primary Indicators (ref. Chan & Mauborgne): 

  • 14% of new business ventures created “blue oceans” (uncontested market space), while 86% were “red oceans”(crowded competitive markets).
  • Those 14% of blue ocean moves delivered 38% of total revenues — showing they were not as common but still meaningful contributors to sales.
  • More strikingly, those same blue ocean moves generated 61% of total profits, highlighting their disproportionate value compared to traditional competitive strategies.


The Blue Ocean Strategy: Creating Uncontested Market Space

Over the past two decades, the Blue Ocean Strategy, developed by W. Chan Kim and Renée Mauborgne, has become a cornerstone of strategic thinking. This framework challenges businesses to move beyond intense competition in existing markets—what Kim and Mauborgne call a "Red Ocean"—and instead, create new, uncontested market spaces, or "Blue Oceans."


A Red Ocean is characterized by fierce rivalry, where companies compete for a shrinking slice of existing demand. In this environment, innovation often focuses on incremental improvements and price wars. 


The Blue Ocean Strategy, by contrast, provides a roadmap for technology businesses to explore untapped markets and generate new demand by focusing on maximizing customer value while simultaneously reducing costs. 


The framework outlines a four-action framework for building a new value curve:

  • Reduce:  What factors should be reduced well below the industry standard?
  • Eliminate:  What factors that the industry takes for granted should be eliminated?
  • Raise:  What factors should be raised well above the industry standard?
  • Create:  What new factors should be developed to fulfill customer needs and create new demand?


IBM's strategic pivot serves as a powerful use case. In the late 20th century, the personal computer (PC) market was a saturated Red Ocean dominated by fierce competition among players like Apple, Microsoft, and Dell. Instead of engaging in a head-to-head battle for individual consumers, IBM applied a Blue Ocean mindset. The company assessed customer preferences and competitor movements, identifying an untapped opportunity in the corporate and enterprise market for powerful mainframe and server products. 


By eliminating its focus on the consumer PC market and raising its value proposition for businesses, IBM created a new demand for high-utility, enterprise-level computing. This strategic move allowed IBM to enter a "Blue Ocean" market that was ripe for expansion, product development, and investment with significantly less competition.


Porter's Five Forces Model: Deconstructing Competitive Dynamics

In contrast to the Blue Ocean's focus on creating new markets, Porter’s Five Forces Model provides a robust framework for analyzing the competitive intensity and profitability of an existing industry. Developed by Michael E. Porter, the model assesses five key economic factors:

  1. Industry Rivalry: The level of competition among existing players.
  2. Bargaining  Power of Suppliers: The suppliers have to drive up the prices of inputs.
  3. Threat of Substitutes: The likelihood of customers switching to alternative products or services.
  4. Threat of New Entrants: The ease or difficulty for new companies to enter the market.
  5. Bargaining  Power of Buyers: The power customers have to drive down prices.


Analyzing the personal computing (PC) market through the lens of Porter's Five Forces provides a clear illustration of this model in action.

  • Industry  Rivalry: The rivalry is intense, with major players like Apple  (MacBook) and Microsoft (Surface) constantly innovating to differentiate themselves through features and price points. The battle for market share is a zero-sum game, where gains by one often mean losses for another.
  • Bargaining  Power of Suppliers: Suppliers of critical components like CPUs (Intel,      AMD), GPUs (Nvidia, AMD), and memory chips (Samsung, Micron) possess significant bargaining power. Because their components are essential for all PC manufacturers, they can set competitive prices, which directly impacts the manufacturers' costs and profit margins.
  • Threat of Substitutes: The threat of substitution is a prevailing factor.   Customers can easily opt for lower-priced alternatives from brands like Dell, HP, and Lenovo, which offer similar functionalities at a fraction of the cost. This also extends to tablets and high-powered smartphones that can serve as substitutes for some laptop functions.
  • Threat of New Entrants: The barriers to entry in the laptop market have intensified over the past decade. The high capital investment required for manufacturing, distribution, and research and development makes it difficult for new companies to compete with established giants. This has led to a deceleration of new entrants in the market.
  • Bargaining  Power of Buyers: Buyers possess significant power in this market.      Brands like Apple and Microsoft promote superior performance, processing power, and a multitude of features to justify higher price points, while competitors like Dell and HP offer similar products for a lower cost. This dynamic allows buyers to dictate what they perceive as "value," forcing companies to either compete on features or price, shifting the balance of power toward the consumer.


Conclusion: A Unified Approach to Technology Strategy

Both the Blue Ocean Strategy and Porter's Five Forces provide valuable insights for technology businesses, but they serve different purposes. The Blue Ocean Strategy is a tool for innovation and market creation, guiding a company to escape the bloody waters of competition. Porter's Five Forces is a tool for strategic analysis, helping a company understand its position within an existing market and identify the forces that determine its profitability.


A forward-thinking organization will leverage both. It will use Porter's framework to continuously monitor its position in existing markets, while simultaneously applying the Blue Ocean mindset to identify and create the next wave of innovation, ensuring long-term growth and market leadership.


End Notes: 

Porter, M. E. (1980). Competitive strategy: Techniques for analyzing industries and competitors. Free Press.


Kim, W. C., & Mauborgne, R. (2005). Blue ocean strategy: How to create uncontested market space and make the competition irrelevant. Harvard Business School Press.

Want Access to NYAG's Vault

 Our clients enjoy free, unlimited access to our research vault, a valuable resource filled with in-depth NYAG reports and data.

  • Want to become a client? Contact us to learn how you can benefit from our services and get complimentary access.
  • Not a client? You can still gain access to this premium research by purchasing a subscription.

access to Nyag's intelligence valut

research and insights, cybersecurity

Navigating the Global Cybercrime Landscape: A Call for Unified Standards

  

Abstract

Global cybercrime has emerged as one of the most destructive and disruptive forms of digital terrorism in modern society. While governments, businesses, and private security organizations are working tirelessly to devise adequate mechanisms to thwart these emerging threats, it has become increasingly evident that a universal cybersecurity standard is yet to be uniformly applied by all nations. This lack of a unified framework, combined with complex jurisdictional differences in data privacy and protection, poses significant challenges for countries and businesses in developing effective defenses. This article explores the various categories of cybercrime, compares the cybercrime laws of different countries, discusses ethical issues, and analyzes how these factors impact organizational decision-making in a global context.


Key Statistics

Cybercrime Projected to Cost $10.5 Trillion Annually by 2025. Global cybercrime is on track to become the third-largest economy, with estimated annual damages reaching $10.5 trillion by 2025—surpassing even the global trade in all major illegal drugs and exceeding the damage inflicted by natural disasters.


225 Billion Cyberattacks Per Day Worldwide. Cyber threats are hitting unprecedented scale. According to Cloudflare, modern internet users—including gamers and general computer users—face a staggering 225 billion attacks daily, underscoring the relentless and automated nature of global cybercrime.


Ransomware Payments Fell 35% in 2024, Highlighting Power of Coordination. Despite more attacks, effective law enforcement and greater victim resistance drove a dramatic one-third drop in ransomware payouts—from $1.25 billion in 2023 down to $813 million in 2024.


Understanding the Threat: An Overview of Cybercrime

The landscape of global cybercriminal activity is an ever-expanding threat to businesses, governments, and individuals. According to the 2021 Verizon Data Breach Investigations Report, "Credential theft, social attacks (e.g., phishing and business email compromise), and errors cause the majority of breaches (67% or more)." Organizations of all sizes are at risk of malicious attacks orchestrated by nefarious actors who seek to exploit network and application vulnerabilities. Common culprits, such as Malware and Denial of Service (DoS) attacks, can inflict significant damage, costing organizations time, money, and, in some cases, legal and regulatory fines.


Malware

Malware is one of the most dangerous and widely distributed forms of cybercrime. It can be delivered through various means, including viruses, trojan horses, worms, spyware, ransomware, and malicious code. Threat actors typically deploy intrusive programs that exploit network and application environments with weak security controls, such as poorly configured firewalls, insufficient intrusion detection systems (IDS/IPS), or lax user access controls. To thwart these attacks, organizations must employ rigorous cyber hygiene practices, including using up-to-date anti-virus software, content filtering, application whitelisting, network segmentation, and regular security testing (e.g., red teaming and penetration testing). A well-defined incident response playbook is also critical for containing attacks through automated detection and containment protocols.


Denial of Service (DoS) Attacks

In a Denial of Service (DoS) attack, malicious hackers use botnets—networks of compromised systems—to launch coordinated attacks that overwhelm a target system, rendering it unavailable to its intended users. This can escalate into a Distributed Denial of 

Service (DDoS) attack, where multiple sources flood the target with traffic. 


Through this form of cybercrime, hackers can compromise the confidentiality, availability, and integrity of Personally Identifiable Information (PII), organizational intellectual property, and trade secrets. To safeguard against DDoS attacks, organizations should implement layered technical security controls such as firewalls, boundary protections, monitoring of suspicious network traffic, authentication and authorization controls, and proactive patch management.


Social Engineering

Social engineering is a tactic used by cybercriminals to deceive unsuspecting victims into revealing sensitive information. These attacks often occur through email phishing, brute-force attacks, malicious links, and phone scams. 


Victims can be tricked into providing anything from their social security number and bank account information to physical access credentials or network passwords. Organizations can mitigate these risks through comprehensive employee user awareness training, password-cracking audits, and application security testing.


A Comparative Look at Cybercrime Regulations

The global legal landscape for cybercrime is fragmented, with different nations adopting varying levels of regulatory rigor.


United States

The United States has extensive federal and state-specific laws dedicated to protecting technology assets from cybercriminals. According to the National Conference of State Legislatures (NCSL), more than 280 cybersecurity bills were introduced or considered in at least 38 states in 2020 alone.


The U.S. federal government regulates large publicly traded organizations through agencies such as the Federal Reserve Bank (FRB), the Federal Financial Institutions Examination Council (FFIEC), and the Office of the Comptroller of the Currency (OCC) to ensure adequate cybersecurity controls. Notable U.S. regulations include the California Consumer Protection Act (CCPA), the Internet of Things (IoT) Cybersecurity Improvement Act, and the Computer Fraud and Abuse Act. This extensive regulatory posture enforces a defense-in-depth cybersecurity program through periodic examinations and compliance audits.


United Kingdom

In the United Kingdom, the primary cybercrime legislation is the Computer Misuse Act 1990 (CMA). This act directly addresses offenses such as unauthorized access, hacking, and data manipulation. Under the CMA, cybercriminals can face fines of up to £5,000 or a prison sentence of up to 10 years. In recent years, the General Data Protection Regulation (GDPR) was ratified to protect the transmission, storage, and use of sensitive data. 


While the GDPR and the CCPA share similar bylaws, the U.S. maintains a more expansive and prescriptive regulatory framework for corporations in relation to cyber and information security compliance.


Southeast Asia

According to a 2018 report by the Asia Centre, Southeast Asian nations have become increasingly prone to cyberattacks due to a surge in internet use. Countries like the Philippines, Singapore, Vietnam, and Indonesia are particularly at risk. Singapore, in particular, is considered one of the “Cyber Five” countries disproportionately vulnerable to cyberattacks due to its reliance on technology.
 

Ironically, while Asian governments and businesses brace for these threats, the region has also been home to organized cyber hacking groups that have disrupted financial markets and global political elections. In response, a number of dedicated forums, such as the ASEAN Regional Forum, have been established to address cyber reform and legislation. Some countries in the region have also begun to adopt components of the Chinese Cyber Security Law (CSL), which was enacted in 2017.


The Impact of Jurisdictional Differences on Decision-Making

For a global organization, understanding the jurisdictional differences in cyber laws is paramount. Ethical issues may arise when business units in different regions have conflicting perspectives on how cyber laws should be governed and enforced. For example, a U.S. business unit may press charges over the sharing of private customer information, a practice that might be considered more common or less regulated in a Southeast Asian market. Aligning on a consistent ethical path for maintaining cybersecurity protocols across jurisdictions introduces a series of complex operational issues that must be navigated by all levels of the organization.


Due to the stringent regulatory requirements mandated by U.S. agencies like the OCC and FRB, my company must maintain a defense-in-depth cybersecurity program that aligns with frameworks like NIST 800-53, ISO-27001, COBIT, and COSO, in addition to laws like the US Data Privacy Act, CCPA, and GDPR.


From a strategic perspective, my organization must carefully consider the regulatory implications of conducting business in markets with minimal or inadequate cyber legislation. Without a unified global approach, the struggle to develop effective technological defenses will continue to be a challenge, leaving organizations vulnerable to evolving threats. A global framework is urgently needed to address this critical gap and ensure a safer digital future for all.


Endnotes:

Morgan, S. (2020). Cybercrime to cost the world $10.5 trillion annually by 2025. Cybersecurity Ventures. https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/


Cloudflare. (2025, January 24). Cloudflare blocks 225 billion cyber threats a day on gamers. Cloudflare Blog. https://blog.cloudflare.com/cloudflare-blocks-225-billion-cyber-threats-a-day-on-gamers/


Chainalysis. (2025, January 18). Ransomware payments dropped 35% in 2024 as victims resisted paying. Chainalysis Blog. https://blog.chainalysis.com/reports/ransomware-2024/


Contact Us

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The New York Advisory Group, LLC

New York, NY, USA

+1 (949) 954-2057

Hours

Mon

07:00 am – 07:00 pm

Tue

07:00 am – 07:00 pm

Wed

07:00 am – 07:00 pm

Thu

07:00 am – 07:00 pm

Fri

07:00 am – 07:00 pm

Sat

By Appointment

Sun

By Appointment

Closed on Major U.S. Holidays

  • Home
  • Services
  • Expertise
  • Approach
  • Research
  • About NYAG

The New York Advisory Group, LLC

New York, NY

+1 (949) 954-2057

Copyright © 2025 The New York Advisory Group, LLC - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept