Cybersecurity report for a successful acquisition

Assignment Help Other Subject
Reference no: EM133386394

Project: Requires the Following TWO Pieces

  • Cybersecurity Report for a Successful Acquisition (12 pages minimum)
  • Executive Summary (one page summary at the beginning of your Acquisition Report)

Specific Details

  • Cybersecurity For A Successful Acquisition Report: (12 page min)
  • Executive Summary (one page)

Conduct a Policy Gap Analysis

Executive summary: This is a one-page summary at the beginning of your report.

Are companies going through an M&A prone to more attacks or more focused attacks?

If so, what is the appropriate course of action?

Should the M&A activities be kept confidential?

explain to the executives that before any systems are integrated, their security policies will need to be reviewed

Conduct a policy gap analysis to ensure the target company's security policies follow relevant industry standards as well as local, state, and national laws and regulations.

Identify what, if any, laws and regulations the target company is subject to.

How would you identify the differences?

How would you learn about the relevant laws and regulations?

Use PCI standards to identify a secure strategy, and operating system protections to protect the credit card data

Select at least two appropriate requirements from the PCI Standards DSS 12 set of requirements and explain how the controls should be implemented, how they will change the current network, and any costs associated with implementing the change.

Review Protocols for Streaming Services

review the protocols, explain how they work along with any known vulnerabilities, and how to secure the company from cyberattacks.

Identify what streaming the companies are doing and the specific technology they are leveraging.

What are the technical vulnerabilities associated with the protocols involved?

Have those been mitigated? And to what extent (i.e., has the risk been reduced to zero, reduced somewhat, shifted to a third party, etc.)?

What residual risk to the target company's assets and IP remain?

Would those risks extend to the current (takeover) company after the merger?

Would that be bad enough to cancel the M&A?

If the response to #5 is yes, then, what should the target company do to further mitigate the risk? How should the takeover company mitigate the risk?

What are the costs associated to the target company (implementing the appropriate mitigation)? If the takeover firm has to take additional measures, identify those costs as well.

Assess the Merged Network Infrastructure

Explain what tactics, techniques, and procedures you would use to understand the network.

identify firewalls, DMZ(s), other network systems, and the status of those devices.

Review the Wireless and BYOD Policies

Explain the media company's current stance on wireless devices and BYOD.

Explain to the managers of the acquisition what needs to be done for the new company to meet the goals of the BYOD policy.

Develop a Data Protection Plan

Include the benefits, implementation activities required for protection and defense measures such as full disk encryption, BitLocker, and platform identity keys.

Convey to your leadership the importance of system integrity and an overall trusted computing base, environment, and support

Describe what this would entail and include Trusted Platform Module (TPM) components and drivers.

How are these mechanisms employed in an authentication and authorization system?

Review Supply Chain Risk

Include supply chain risks and list the security measures in place to mitigate those risks.

Use the NIST Special Publication 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations to explain the areas that need to be addressed.

Build a Vulnerability Management Program

Use NIST Special Publication 800-40 Guide to Enterprise Patch Management Technologies to develop a program to scan and build a vulnerability management program

Explain to the managers how to implement this change, why it is needed, and any costs involved.

Reference no: EM133386394

Questions Cloud

Talk about what element are needed to for a valid contract : Talk about what element are needed to for a valid contract. Also, the difference between contracts, promissory estoppel and quantum meruit
Identify and describe three strengths of this approach : Identify and describe three strengths of this approach. Identify & describe one limitation of this approach. What are the fundamental skills used to form
Do you think a company that paid more careful attention : What decisions related to expatriates can organizations take to maximize the benefits to the company despite the economic downturn?
Which of these do you believe is most useful : Which of these do you believe is most useful in understanding motivation in present day western society?
Cybersecurity report for a successful acquisition : Cybersecurity Report for a Successful Acquisition - Conduct a policy gap analysis to ensure the target company's security policies follow relevant industry
Standardization or adaptation in markets : Would you classify IKEA's approach as one of standardization or adaptation in markets around the world? Explain.
Write about descartes argument : Write about Descartes argument, This paper has 2 parts. In the first part, you will fully reconstruct the argument and explain it. In the second part
Explain the ethical and legal implications of the scenario : Explain the ethical and legal implications of the scenario on all stakeholders involved, including the prescriber, pharmacist, patient, and patient's family.
Develop your own definition of the word work : Develop your own definition of the word "work." Using this definition, explain whether you think everyone naturally has a desire to work.

Reviews

Write a Review

Other Subject Questions & Answers

  Differences between the two tiers in state of oklahoma

Are there tiered levels between dependent to independent license in your state (such as LAC to LPC, LPC to LCPC, or counseling intern to LMHC)?

  Explain distributive and integrative bargaining approaches

Discuss how negotiators prepare for negotiations. Explain the distributive and integrative bargaining approaches. How do these methods differ?

  Cultural environment on business management in a country

Required to investigate the impact of the cultural environment on business management in a country: Singapore in the Asia Pacific Region. Must show critical awa

  Assess issues of conflict between the players and management

Assess the issues of conflict between the players and management during the history of the sport. Analyze mistakes made in negotiations and the effect.

  Discuss the telnets of information security

Discuss the telnets of information security and how windows and application could be mapped into a typical IT Infrastructure that could help to secure

  Define the fourth amendment from britain

The Fourth Amendment: Tell me what the fourth amendment provides as well as a history of the fourth amendment from Britain, to the U.S. colonies to now

  Determine the rate heat is rejected

A refrigerator, with coils at 28 C operates with a coefficient performance of 4.0 and a power input of 0.8 kW. Heat is rejected from the surrounding air at 20 C. Determine a)the rate heat is rejected(kW), b)the lowest theoretical temp inside the refr..

  Describe the current practice related to the problem

Write a brief summary (suggested length of 2-3 pages) of the significance and background of a healthcare problem by doing the following: Describe a healthcare problem. Explain the significance of the problem. Describe the current practice related t..

  Write a paper about preventing medication errors among nurse

Write a four pages paper about Preventing Medication Errors Among Nurses. Introduction-Statistics, Costs, Medication Error involving Nurses.

  Describe the job of the president of the united states

You will assume the role of the DNI. It is your job to brief me--the POTUS (President of the United States) and a few of my top security advisors.

  Charts the commonalities between the given historic periods

Write an essay that charts the commonalities between these historic periods. In short, you should link the cultures of the 16th and 18th centuries by highlighting shared ideas and traditions in art that appeared during the Renaissance and reappea..

  What experience do you have using rti with children

What experience do you have using RTI with children? Explain how you use RTI. If you do not have any experience with RTI, what are your thoughts on using RTI.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd