Cybersecurity report for a successful acquisition

Assignment Help Other Subject
Reference no: EM133386394

Project: Requires the Following TWO Pieces

  • Cybersecurity Report for a Successful Acquisition (12 pages minimum)
  • Executive Summary (one page summary at the beginning of your Acquisition Report)

Specific Details

  • Cybersecurity For A Successful Acquisition Report: (12 page min)
  • Executive Summary (one page)

Conduct a Policy Gap Analysis

Executive summary: This is a one-page summary at the beginning of your report.

Are companies going through an M&A prone to more attacks or more focused attacks?

If so, what is the appropriate course of action?

Should the M&A activities be kept confidential?

explain to the executives that before any systems are integrated, their security policies will need to be reviewed

Conduct a policy gap analysis to ensure the target company's security policies follow relevant industry standards as well as local, state, and national laws and regulations.

Identify what, if any, laws and regulations the target company is subject to.

How would you identify the differences?

How would you learn about the relevant laws and regulations?

Use PCI standards to identify a secure strategy, and operating system protections to protect the credit card data

Select at least two appropriate requirements from the PCI Standards DSS 12 set of requirements and explain how the controls should be implemented, how they will change the current network, and any costs associated with implementing the change.

Review Protocols for Streaming Services

review the protocols, explain how they work along with any known vulnerabilities, and how to secure the company from cyberattacks.

Identify what streaming the companies are doing and the specific technology they are leveraging.

What are the technical vulnerabilities associated with the protocols involved?

Have those been mitigated? And to what extent (i.e., has the risk been reduced to zero, reduced somewhat, shifted to a third party, etc.)?

What residual risk to the target company's assets and IP remain?

Would those risks extend to the current (takeover) company after the merger?

Would that be bad enough to cancel the M&A?

If the response to #5 is yes, then, what should the target company do to further mitigate the risk? How should the takeover company mitigate the risk?

What are the costs associated to the target company (implementing the appropriate mitigation)? If the takeover firm has to take additional measures, identify those costs as well.

Assess the Merged Network Infrastructure

Explain what tactics, techniques, and procedures you would use to understand the network.

identify firewalls, DMZ(s), other network systems, and the status of those devices.

Review the Wireless and BYOD Policies

Explain the media company's current stance on wireless devices and BYOD.

Explain to the managers of the acquisition what needs to be done for the new company to meet the goals of the BYOD policy.

Develop a Data Protection Plan

Include the benefits, implementation activities required for protection and defense measures such as full disk encryption, BitLocker, and platform identity keys.

Convey to your leadership the importance of system integrity and an overall trusted computing base, environment, and support

Describe what this would entail and include Trusted Platform Module (TPM) components and drivers.

How are these mechanisms employed in an authentication and authorization system?

Review Supply Chain Risk

Include supply chain risks and list the security measures in place to mitigate those risks.

Use the NIST Special Publication 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations to explain the areas that need to be addressed.

Build a Vulnerability Management Program

Use NIST Special Publication 800-40 Guide to Enterprise Patch Management Technologies to develop a program to scan and build a vulnerability management program

Explain to the managers how to implement this change, why it is needed, and any costs involved.

Reference no: EM133386394

Questions Cloud

Talk about what element are needed to for a valid contract : Talk about what element are needed to for a valid contract. Also, the difference between contracts, promissory estoppel and quantum meruit
Identify and describe three strengths of this approach : Identify and describe three strengths of this approach. Identify & describe one limitation of this approach. What are the fundamental skills used to form
Do you think a company that paid more careful attention : What decisions related to expatriates can organizations take to maximize the benefits to the company despite the economic downturn?
Which of these do you believe is most useful : Which of these do you believe is most useful in understanding motivation in present day western society?
Cybersecurity report for a successful acquisition : Cybersecurity Report for a Successful Acquisition - Conduct a policy gap analysis to ensure the target company's security policies follow relevant industry
Standardization or adaptation in markets : Would you classify IKEA's approach as one of standardization or adaptation in markets around the world? Explain.
Write about descartes argument : Write about Descartes argument, This paper has 2 parts. In the first part, you will fully reconstruct the argument and explain it. In the second part
Explain the ethical and legal implications of the scenario : Explain the ethical and legal implications of the scenario on all stakeholders involved, including the prescriber, pharmacist, patient, and patient's family.
Develop your own definition of the word work : Develop your own definition of the word "work." Using this definition, explain whether you think everyone naturally has a desire to work.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd