×




Cyber Breach at Target SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis

Case Study SWOT Analysis Solution

Case Study Description of Cyber Breach at Target


In November and December of 2013, Target Corporation suffered one of the largest cyber breaches till date. The breach that occurred during the busy holiday shopping season resulted in personal and credit card information of about 110 million Target customers to be compromised. The case describes the details of the breach, circumstances that lead to it, consequences for customers and for Target, and the company's response. The case then discusses the role of management and the board of directors in cyber security at Target. Target's board of directors was subject to intense criticism by shareholders and governance experts such as the leading proxy advisor Institutional Shareholder Services (ISS). The case discusses the critique and defense of the board's role. The case is designed to allow for a discussion of the causes and consequences of the cyber breach and accountability of directors in cyber security.

Authors :: Suraj Srinivasan, Lynn S. Paine, Neeraj Goyal

Topics :: Leadership & Managing People

Tags :: Crisis management, Customers, Organizational culture, Personnel policies, Security & privacy, SWOT Analysis, SWOT Matrix, TOWS, Weighted SWOT Analysis

Swot Analysis of "Cyber Breach at Target" written by Suraj Srinivasan, Lynn S. Paine, Neeraj Goyal includes – strengths weakness that are internal strategic factors of the organization, and opportunities and threats that Cyber Breach facing as an external strategic factors. Some of the topics covered in Cyber Breach at Target case study are - Strategic Management Strategies, Crisis management, Customers, Organizational culture, Personnel policies, Security & privacy and Leadership & Managing People.


Some of the macro environment factors that can be used to understand the Cyber Breach at Target casestudy better are - – challanges to central banks by blockchain based private currencies, digital marketing is dominated by two big players Facebook and Google, geopolitical disruptions, customer relationship management is fast transforming because of increasing concerns over data privacy, supply chains are disrupted by pandemic , increasing commodity prices, banking and financial system is disrupted by Bitcoin and other crypto currencies, competitive advantages are harder to sustain because of technology dispersion, talent flight as more people leaving formal jobs, etc



12 Hrs

$59.99
per Page
  • 100% Plagiarism Free
  • On Time Delivery | 27x7
  • PayPal Secure
  • 300 Words / Page
  • Buy Now

24 Hrs

$49.99
per Page
  • 100% Plagiarism Free
  • On Time Delivery | 27x7
  • PayPal Secure
  • 300 Words / Page
  • Buy Now

48 Hrs

$39.99
per Page
  • 100% Plagiarism Free
  • On Time Delivery | 27x7
  • PayPal Secure
  • 300 Words / Page
  • Buy Now







Introduction to SWOT Analysis of Cyber Breach at Target


SWOT stands for an organization’s Strengths, Weaknesses, Opportunities and Threats . At Oak Spring University , we believe that protagonist in Cyber Breach at Target case study can use SWOT analysis as a strategic management tool to assess the current internal strengths and weaknesses of the Cyber Breach, and to figure out the opportunities and threats in the macro environment – technological, environmental, political, economic, social, demographic, etc in which Cyber Breach operates in.

According to Harvard Business Review, 75% of the managers use SWOT analysis for various purposes such as – evaluating current scenario, strategic planning, new venture feasibility, personal growth goals, new market entry, Go To market strategies, portfolio management and strategic trade-off assessment, organizational restructuring, etc.




SWOT Objectives / Importance of SWOT Analysis and SWOT Matrix


SWOT analysis of Cyber Breach at Target can be done for the following purposes –
1. Strategic planning using facts provided in Cyber Breach at Target case study
2. Improving business portfolio management of Cyber Breach
3. Assessing feasibility of the new initiative in Leadership & Managing People field.
4. Making a Leadership & Managing People topic specific business decision
5. Set goals for the organization
6. Organizational restructuring of Cyber Breach




Strengths Cyber Breach at Target | Internal Strategic Factors
What are Strengths in SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis

The strengths of Cyber Breach in Cyber Breach at Target Harvard Business Review case study are -

Highly skilled collaborators

– Cyber Breach has highly efficient outsourcing and offshoring strategy. It has resulted in greater operational flexibility and bringing down the costs in highly price sensitive segment. Secondly the value chain collaborators of the firm in Cyber Breach at Target HBR case study have helped the firm to develop new products and bring them quickly to the marketplace.

Innovation driven organization

– Cyber Breach is one of the most innovative firm in sector. Manager in Cyber Breach at Target Harvard Business Review case study can use Clayton Christensen Disruptive Innovation strategies to further increase the scale of innovtions in the organization.

Strong track record of project management

– Cyber Breach is known for sticking to its project targets. This enables the firm to manage – time, project costs, and have sustainable margins on the projects.

Cross disciplinary teams

– Horizontal connected teams at the Cyber Breach are driving operational speed, building greater agility, and keeping the organization nimble to compete with new competitors. It helps are organization to ideate new ideas, and execute them swiftly in the marketplace.

Sustainable margins compare to other players in Leadership & Managing People industry

– Cyber Breach at Target firm has clearly differentiated products in the market place. This has enabled Cyber Breach to fetch slight price premium compare to the competitors in the Leadership & Managing People industry. The sustainable margins have also helped Cyber Breach to invest into research and development (R&D) and innovation.

Learning organization

- Cyber Breach is a learning organization. It has inculcated three key characters of learning organization in its processes and operations – exploration, creativity, and expansiveness. The work place at Cyber Breach is open place that encourages instructiveness, ideation, open minded discussions, and creativity. Employees and leaders in Cyber Breach at Target Harvard Business Review case study emphasize – knowledge, initiative, and innovation.

Ability to lead change in Leadership & Managing People field

– Cyber Breach is one of the leading players in its industry. Over the years it has not only transformed the business landscape in its segment but also across the whole industry. The ability to lead change has enabled Cyber Breach in – penetrating new markets, reaching out to new customers, and providing different value propositions to different customers in the international markets.

Low bargaining power of suppliers

– Suppliers of Cyber Breach in the sector have low bargaining power. Cyber Breach at Target has further diversified its suppliers portfolio by building a robust supply chain across various countries. This helps Cyber Breach to manage not only supply disruptions but also source products at highly competitive prices.

Effective Research and Development (R&D)

– Cyber Breach has innovation driven culture where significant part of the revenues are spent on the research and development activities. This has resulted in, as mentioned in case study Cyber Breach at Target - staying ahead in the industry in terms of – new product launches, superior customer experience, highly competitive pricing strategies, and great returns to the shareholders.

High switching costs

– The high switching costs that Cyber Breach has built up over years in its products and services combo offer has resulted in high retention of customers, lower marketing costs, and greater ability of the firm to focus on its customers.

Digital Transformation in Leadership & Managing People segment

- digital transformation varies from industry to industry. For Cyber Breach digital transformation journey comprises differing goals based on market maturity, customer technology acceptance, and organizational culture. Cyber Breach has successfully integrated the four key components of digital transformation – digital integration in processes, digital integration in marketing and customer relationship management, digital integration into the value chain, and using technology to explore new products and market opportunities.

Organizational Resilience of Cyber Breach

– The covid-19 pandemic has put organizational resilience at the centre of everthing that Cyber Breach does. Organizational resilience comprises - Financial Resilience, Operational Resilience, Technological Resilience, Organizational Resilience, Business Model Resilience, and Reputation Resilience.






Weaknesses Cyber Breach at Target | Internal Strategic Factors
What are Weaknesses in SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis

The weaknesses of Cyber Breach at Target are -

Need for greater diversity

– Cyber Breach has taken concrete steps on diversity, equity, and inclusion. But the efforts so far has resulted in limited success. It needs to expand the recruitment and selection process to hire more people from the minorities and underprivileged background.

Ability to respond to the competition

– As the decision making is very deliberative, highlighted in the case study Cyber Breach at Target, in the dynamic environment Cyber Breach has struggled to respond to the nimble upstart competition. Cyber Breach has reasonably good record with similar level competitors but it has struggled with new entrants taking away niches of its business.

High dependence on star products

– The top 2 products and services of the firm as mentioned in the Cyber Breach at Target HBR case study still accounts for major business revenue. This dependence on star products in has resulted into insufficient focus on developing new products, even though Cyber Breach has relatively successful track record of launching new products.

Products dominated business model

– Even though Cyber Breach has some of the most successful products in the industry, this business model has made each new product launch extremely critical for continuous financial growth of the organization. firm in the HBR case study - Cyber Breach at Target should strive to include more intangible value offerings along with its core products and services.

High operating costs

– Compare to the competitors, firm in the HBR case study Cyber Breach at Target has high operating costs in the. This can be harder to sustain given the new emerging competition from nimble players who are using technology to attract Cyber Breach 's lucrative customers.

High cash cycle compare to competitors

Cyber Breach has a high cash cycle compare to other players in the industry. It needs to shorten the cash cycle by 12% to be more competitive in the marketplace, reduce inventory costs, and be more profitable.

High bargaining power of channel partners

– Because of the regulatory requirements, Suraj Srinivasan, Lynn S. Paine, Neeraj Goyal suggests that, Cyber Breach is facing high bargaining power of the channel partners. So far it has not able to streamline the operations to reduce the bargaining power of the value chain partners in the industry.

Skills based hiring

– The stress on hiring functional specialists at Cyber Breach has created an environment where the organization is dominated by functional specialists rather than management generalist. This has resulted into product oriented approach rather than marketing oriented approach or consumers oriented approach.

No frontier risks strategy

– After analyzing the HBR case study Cyber Breach at Target, it seems that company is thinking about the frontier risks that can impact Leadership & Managing People strategy. But it has very little resources allocation to manage the risks emerging from events such as natural disasters, climate change, melting of permafrost, tacking the rise of artificial intelligence, opportunities and threats emerging from commercialization of space etc.

Low market penetration in new markets

– Outside its home market of Cyber Breach, firm in the HBR case study Cyber Breach at Target needs to spend more promotional, marketing, and advertising efforts to penetrate international markets.

Aligning sales with marketing

– It come across in the case study Cyber Breach at Target that the firm needs to have more collaboration between its sales team and marketing team. Sales professionals in the industry have deep experience in developing customer relationships. Marketing department in the case Cyber Breach at Target can leverage the sales team experience to cultivate customer relationships as Cyber Breach is planning to shift buying processes online.




Opportunities Cyber Breach at Target | External Strategic Factors
What are Opportunities in the SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis


The opportunities highlighted in the Harvard Business Review case study Cyber Breach at Target are -

Increase in government spending

– As the United States and other governments are increasing social spending and infrastructure spending to build economies post Covid-19, Cyber Breach can use these opportunities to build new business models that can help the communities that Cyber Breach operates in. Secondly it can use opportunities from government spending in Leadership & Managing People sector.

Learning at scale

– Online learning technologies has now opened space for Cyber Breach to conduct training and development for its employees across the world. This will result in not only reducing the cost of training but also help employees in different part of the world to integrate with the headquarter work culture, ethos, and standards.

Changes in consumer behavior post Covid-19

– Consumer behavior has changed in the Leadership & Managing People industry because of Covid-19 restrictions. Some of this behavior will stay once things get back to normal. Cyber Breach can take advantage of these changes in consumer behavior to build a far more efficient business model. For example consumer regular ordering of products can reduce both last mile delivery costs and market penetration costs. Cyber Breach can further use this consumer data to build better customer loyalty, provide better products and service collection, and improve the value proposition in inflationary times.

Using analytics as competitive advantage

– Cyber Breach has spent a significant amount of money and effort to integrate analytics and machine learning into its operations in the sector. This continuous investment in analytics has enabled, as illustrated in the Harvard case study Cyber Breach at Target - to build a competitive advantage using analytics. The analytics driven competitive advantage can help Cyber Breach to build faster Go To Market strategies, better consumer insights, developing relevant product features, and building a highly efficient supply chain.

Leveraging digital technologies

– Cyber Breach can leverage digital technologies such as artificial intelligence and machine learning to automate the production process, customer analytics to get better insights into consumer behavior, realtime digital dashboards to get better sales tracking, logistics and transportation, product tracking, etc.

Developing new processes and practices

– Cyber Breach can develop new processes and procedures in Leadership & Managing People industry using technology such as automation using artificial intelligence, real time transportation and products tracking, 3D modeling for concept development and new products pilot testing etc.

Manufacturing automation

– Cyber Breach can use the latest technology developments to improve its manufacturing and designing process in Leadership & Managing People segment. It can use CAD and 3D printing to build a quick prototype and pilot testing products. It can leverage automation using machine learning and artificial intelligence to do faster production at lowers costs, and it can leverage the growth in satellite and tracking technologies to improve inventory management, transportation, and shipping.

Lowering marketing communication costs

– 5G expansion will open new opportunities for Cyber Breach in the field of marketing communication. It will bring down the cost of doing business, provide technology platform to build new products in the Leadership & Managing People segment, and it will provide faster access to the consumers.

Redefining models of collaboration and team work

– As explained in the weaknesses section, Cyber Breach is facing challenges because of the dominance of functional experts in the organization. Cyber Breach at Target case study suggests that firm can utilize new technology to build more coordinated teams and streamline operations and communications using tools such as CAD, Zoom, etc.

Identify volunteer opportunities

– Covid-19 has impacted working population in two ways – it has led to people soul searching about their professional choices, resulting in mass resignation. Secondly it has encouraged people to do things that they are passionate about. This has opened opportunities for businesses to build volunteer oriented socially driven projects. Cyber Breach can explore opportunities that can attract volunteers and are consistent with its mission and vision.

Better consumer reach

– The expansion of the 5G network will help Cyber Breach to increase its market reach. Cyber Breach will be able to reach out to new customers. Secondly 5G will also provide technology framework to build new tools and products that can help more immersive consumer experience and faster consumer journey.

Building a culture of innovation

– managers at Cyber Breach can make experimentation a productive activity and build a culture of innovation using approaches such as – mining transaction data, A/B testing of websites and selling platforms, engaging potential customers over various needs, and building on small ideas in the Leadership & Managing People segment.

Remote work and new talent hiring opportunities

– The widespread usage of remote working technologies during Covid-19 has opened opportunities for Cyber Breach to expand its talent hiring zone. According to McKinsey Global Institute, 20% of the high end workforce in fields such as finance, information technology, can continously work from remote local post Covid-19. This presents a really great opportunity for Cyber Breach to hire the very best people irrespective of their geographical location.




Threats Cyber Breach at Target External Strategic Factors
What are Threats in the SWOT Analysis / TOWS Matrix / Weighted SWOT Analysis


The threats mentioned in the HBR case study Cyber Breach at Target are -

Barriers of entry lowering

– As technology is more democratized, the barriers to entry in the industry are lowering. It can presents Cyber Breach with greater competitive threats in the near to medium future. Secondly it will also put downward pressure on pricing throughout the sector.

Trade war between China and United States

– The trade war between two of the biggest economies can hugely impact the opportunities for Cyber Breach in the Leadership & Managing People industry. The Leadership & Managing People industry is already at various protected from local competition in China, with the rise of trade war the protection levels may go up. This presents a clear threat of current business model in Chinese market.

Aging population

– As the populations of most advanced economies are aging, it will lead to high social security costs, higher savings among population, and lower demand for goods and services in the economy. The household savings in US, France, UK, Germany, and Japan are growing faster than predicted because of uncertainty caused by pandemic.

Environmental challenges

– Cyber Breach needs to have a robust strategy against the disruptions arising from climate change and energy requirements. EU has identified it as key priority area and spending 30% of its 880 billion Euros European post Covid-19 recovery funds on green technology. Cyber Breach can take advantage of this fund but it will also bring new competitors in the Leadership & Managing People industry.

Consumer confidence and its impact on Cyber Breach demand

– There is a high probability of declining consumer confidence, given – high inflammation rate, rise of gig economy, lower job stability, increasing cost of living, higher interest rates, and aging demography. All the factors contribute to people saving higher rate of their income, resulting in lower consumer demand in the industry and other sectors.

Regulatory challenges

– Cyber Breach needs to prepare for regulatory challenges as consumer protection groups and other pressure groups are vigorously advocating for more regulations on big business - to reduce inequality, to create a level playing field, to product data privacy and consumer privacy, to reduce the influence of big money on democratic institutions, etc. This can lead to significant changes in the Leadership & Managing People industry regulations.

Instability in the European markets

– European Union markets are facing three big challenges post Covid – expanded balance sheets, Brexit related business disruption, and aggressive Russia looking to distract the existing security mechanism. Cyber Breach will face different problems in different parts of Europe. For example it will face inflationary pressures in UK, France, and Germany, balance sheet expansion and demand challenges in Southern European countries, and geopolitical instability in the Eastern Europe.

Technology acceleration in Forth Industrial Revolution

– Cyber Breach has witnessed rapid integration of technology during Covid-19 in the Leadership & Managing People industry. As one of the leading players in the industry, Cyber Breach needs to keep up with the evolution of technology in the Leadership & Managing People sector. According to Mckinsey study top managers believe that the adoption of technology in operations, communications is 20-25 times faster than what they planned in the beginning of 2019.

High level of anxiety and lack of motivation

– the Great Resignation in United States is the sign of broader dissatisfaction among the workforce in United States. Cyber Breach needs to understand the core reasons impacting the Leadership & Managing People industry. This will help it in building a better workplace.

Capital market disruption

– During the Covid-19, Dow Jones has touched record high. The valuations of a number of companies are way beyond their existing business model potential. This can lead to capital market correction which can put a number of suppliers, collaborators, value chain partners in great financial difficulty. It will directly impact the business of Cyber Breach.

Stagnating economy with rate increase

– Cyber Breach can face lack of demand in the market place because of Fed actions to reduce inflation. This can lead to sluggish growth in the economy, lower demands, lower investments, higher borrowing costs, and consolidation in the field.

Increasing wage structure of Cyber Breach

– Post Covid-19 there is a sharp increase in the wages especially in the jobs that require interaction with people. The increasing wages can put downward pressure on the margins of Cyber Breach.

New competition

– After the dotcom bust of 2001, financial crisis of 2008-09, the business formation in US economy had declined. But in 2020 alone, there are more than 1.5 million new business applications in United States. This can lead to greater competition for Cyber Breach in the Leadership & Managing People sector and impact the bottomline of the organization.




Weighted SWOT Analysis of Cyber Breach at Target Template, Example


Not all factors mentioned under the Strengths, Weakness, Opportunities, and Threats quadrants in the SWOT Analysis are equal. Managers in the HBR case study Cyber Breach at Target needs to zero down on the relative importance of each factor mentioned in the Strengths, Weakness, Opportunities, and Threats quadrants. We can provide the relative importance to each factor by assigning relative weights. Weighted SWOT analysis process is a three stage process –

First stage for doing weighted SWOT analysis of the case study Cyber Breach at Target is to rank the strengths and weaknesses of the organization. This will help you to assess the most important strengths and weaknesses of the firm and which one of the strengths and weaknesses mentioned in the initial lists are marginal and can be left out.

Second stage for conducting weighted SWOT analysis of the Harvard case study Cyber Breach at Target is to give probabilities to the external strategic factors thus better understanding the opportunities and threats arising out of macro environment changes and developments.

Third stage of constructing weighted SWOT analysis of Cyber Breach at Target is to provide strategic recommendations includes – joining likelihood of external strategic factors such as opportunities and threats to the internal strategic factors – strengths and weaknesses. You should start with external factors as they will provide the direction of the overall industry. Secondly by joining probabilities with internal strategic factors can help the company not only strategic fit but also the most probably strategic trade-off that Cyber Breach needs to make to build a sustainable competitive advantage.



--- ---

Minsheng Bank: Penetrating The US Market Through Acquisition SWOT Analysis / TOWS Matrix

Ricky Lai, Gerald Yong Gao, Jiangyong Lu, Hung Gay Fung , Global Business


Medtronic, Inc. SWOT Analysis / TOWS Matrix

John B. Goodman, Patrick Moreton , Global Business


Inverness Medical Innovations--Born Global (A) SWOT Analysis / TOWS Matrix

Daniel J. Isenberg , Innovation & Entrepreneurship


Ak Gida: IPO or Strategic Sale SWOT Analysis / TOWS Matrix

Suraj Srinivasan, Eren Kuzucu , Finance & Accounting


BetterLiving Patio Rooms SWOT Analysis / TOWS Matrix

Dan D'Heilly, William D. Bygrave , Innovation & Entrepreneurship


ALWAYSi SWOT Analysis / TOWS Matrix

Paul A. Gompers, Sergio Rattner , Finance & Accounting


The End of Oil SWOT Analysis / TOWS Matrix

Anita M. McGahan , Strategy & Execution