Examine the strategies for improving cybersecurity


Assignment:

Assignment Description

PowerPoint Presentation

The Center for Internet Security (CIS) has identified 20 controls that, if fully implemented and managed, are effective at maintaining a healthy environment for information and communication technology (ICT) systems. The CIS 20 controls aim at providing foundational and advanced cybersecurity actions to prevent ICT systems from the most common cybersecurity attacks.

Of the 20 CIS controls, the first 5 eliminate the most common system threats of ICT vulnerabilities. These controls are as follows:

• Inventory of Authorized and Unauthorized Devices

• Inventory of Authorized and Unauthorized Software

• Security Configurations for Hardware and Software

• Continuous Vulnerability Assessments and Remediation

• Controlled Use of Administrative Privileges

You have recently been hired as the Chief Information Security Officer (CISO) of a global retail chain. You have replaced the previous CISO due to a breach in the organization's system that resulted in thousands of customers' credit card information being stolen.

Craft a presentation that you will narrate to the Board of Directors of the organization that outlines the value of implementing the first 5 controls promoted by the Center of Internet Security (CIS). Areas to consider in your presentation are as follows:

• Value of each control

• Real-world scenarios in which each control could have prevented a cyber-intrusion/attack

• Cost considerations; seek return on investment (ROI)

• Whether training will be needed for ICT system staff and the total workforce

• Company culture and adaptability to new security controls

Use critical thinking, and design a presentation that identifies the value of the first 5 CIS controls. The goal of the assignment is to create confidence in the organization that these controls will help prevent future intrusions and protect the organization's information and communication technology (ICT) systems and company brand.

Defend each control using 3 to 5 slides per control. The presentation should seek to have visual and content value. Incorporate at least 5 resources to show that you have conducted ample research to support your business plan.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reading Assignment

Reading Materials

• This article examines some of the best practices and strategies for improving cybersecurity. Click here to read the article.

• This article discusses six of the best practices for enterprise-level cybersecurity. Click on this link to learn more.

• This Web site contains information related to CIS controls and how they can help reduce an organization's cyber vulnerability. Click here to view the Web site.

• This article examines how to take action against cybersecurity threats using industry-promoted practices. Click on this link to read the article.

• This article provides insights on how disaster recovery and business continuity are linked. Click here to learn more.

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Examine the strategies for improving cybersecurity
Reference No:- TGS02993215

Now Priced at $30 (50% Discount)

Recommended (93%)

Rated (4.5/5)