Identify key stakeholders that the csirt will serve

Assignment Help Operation Management
Reference no: EM132284386

CASE: Create A Cybersecurity Incident Response Team

Cybersecurity events can happen at any time. Notable historic security events show the shortening cycle of threats: the Melissa virus, which took several days to spread; the "Love Letter" worm, which became rampant in just a day; and the Nimda worm, which wreaked havoc in just hours. These incidents show that little time is needed to infect systems around the world, and a company must therefore have the capability to respond quickly to prevent major losses and interruptions in service.

"Every minute, we are seeing about half a million attack attempts that are happening in cyber space."
-Derek Manky, Fortinet global security strategist

For regulated businesses such as banking and health care, governments are enacting laws that require businesses to provide mechanisms for protecting consumer data and privacy. And those mechanisms can't come quickly enough, according to security experts such as

Mansky:

Because of rapid changes in security threats, even huge capital expenditures for hardware and software design for the security of your network will only help reduce, but not eliminate, the risks associated with a security event. A well-organized CSIRT is one of the components of an organization's strategy, and it is a component that needs to be embedded and embraced at all levels of the organization.
So what happens when the organization is breached?

Every incident yields a cost for the organization. If caught early, the cost can be minimal. However, if an incident occurs and there is no clear plan and a good team to execute the plan, the costs associated with a breach can climb.

As we read earlier, a good cybersecurity plan does not attempt to catch EVERY intrusion, but instead strategically focuses on: "identifying and protecting the company's strategically important cyber assets and figuring out in advance how to mitigate damage when attacks occur."

It is a simple fact that the number of computer and software vulnerabilities is growing and the sophistication of attacks is increasing. Organizations need to develop a comprehensive plan to secure sensitive information and ensure the survivability of their critical infrastructure.

Case Background

iFinanceis one of the largest banks in the country with a national network ofbranches,products and services that span the entire financial range-from traditional consumer banking and investment services to insurance and corporate investment banking.

iFinance was formed during the three decades ago through acquisitions of regional banks in the West and Midwest. Those banks had grown from the mergers of numerous smaller banks resulting in the acquisition or merger of dozens of banks.

iFinance has billions in assets and operates 2,225 banking offices in 25 states, over 4000 ATMs, and provides online banking and mobile banking apps to both business and personal customers. The bank employs 25,000 tellers, staff, and management.

A problem facing iFinance is that, due to these mergers and acquisitions, each of its business units has its own legacy networks and vision of how security measures would be implemented to protect its resources. As iFinancehas acquired more companies and increased the number of service offerings, it has become more critical that a standard set of repeatable processes be put in place to deal with security incidents.iFinance's approach to security must be carefully coordinated across all business units to provide a coordinated, consistent, repeatable process.

The top executives ofiFinance recognize that, to be successful in the financial industry, they must have a clear understanding of its security risks and be able to identify solutions to eliminate or minimize any potential threats to the organization. To get started, this falliFinance published and distributed its security architecture plan for infrastructure security on its internal website. This activity helped iFinance articulate a starting direction for its information security needs.

Your Role

You are anewly-hiredInformation Security Manager that started a few months ago.You have noticed that security incidents are occurring, and although these incidents are being addressed, they were being handled inconsistently across the iFinance organization. You recognize that a consistent incident response system needs to be implemented.

Guidelines:

Part 1:

Submit your individual write up on the last day of the intersession (in the Inter-session Activities Assignment Area of the Bb course), prior to arriving in class.

• Use a minimum of 3 scholarly references from peer-reviewed, academic journals (must be accessed through Ottawa's online library), and include supporting materials and references from your web-based research of the selected organization.

• Your paper and all citations/references should be in APA format.

• You should include the following sections in your paper:

o Mission and vision statement for the CSIRT

o Identify key stakeholders that the CSIRT will serve, and how you will

o Determine the scope and levels of service the CSIRT would provide

o Staffing Recommendations - identifying and procuring personnel, equipment, and infrastructure requirements for the CSIRT

Identify and utilize existing information security technical staff and resources to support the CSIRT activities (when needed)

Identify any needed external resources needed

o Develop what you believe are the top 5 key CSIRT policies and procedures (based on best practices and everything you have reviewed and learned in this course, and any additional resources needed) that should guide all other policies and processes, given iFinance's industry, size, structure, etc.

o Define the CSIRT reporting structure, authority, and organizational model to ensure that the team has the access, funding, and a clear mandate

o Estimate the amount of additional funding needed to implement and maintain the CSIRT

o Communications plan to make security a priority for iFinance's many employees in offices distributed throughout 25 states

o Establish a proposed timeline for implementing the CSIRT

o Conduct research to establish ROI

Find examples of cybersecurity incidents in similar organizations

To identify the total cost of an incident, consider the direct costs of manpower, equipment, and lost production time, and also other indirect costs, such as the potential cost of lost business and damage to the company's reputation and brand image.

Part 2 (This will occur during your Day 3 session)

Armed with support from key stakeholders, knowledge of best practices currently being used in incident management, an understanding of the current and potential threats to iFinance, and a vision and plan for implementing a CSIRT, it is now time to make the business case to the Chief Technology Officer (CTO), Chief Operations Officer (COO), and the Chief Legal Counsel to finalize plans for funding and staffing an operational CSIRT.

You should present a well-researched, compelling rationale that includes existing/pending government regulations, the costs of attacks (direct and indirect costs), and a proposed timeline, budget, and organizational structure for the CSIRT and how it fits into the organization.

Your team will be given time to discuss each other' write ups, and you can mash up the best aspects of your write ups into one team framework. Your team will then present your CSIRT proposal. Remember, communication and internal buy-in is key to your role as managers and executives on all projects. You are not merely presenting facts, you are "selling" your proposal in a persuasive presentation.

Reference no: EM132284386

Questions Cloud

Why was the regulation or statue challenged : Why was the regulation or statue challenged? What was the final judgment of the court and will this judgment impact the provisions of the law?
Percent discount rate between periods : Suppose Debbie has a 5 percent discount rate between periods. Which career will she pursue? What if she had a 15 percent discount rate?
Position of the short and long run aggregate supply curves : For each of the following events, explain the effect if any, on the position of the short and long run aggregate supply curves and the aggregate demand curves.
Purchase in order to maximize his expected profit : How many pounds of oysters should he purchase in order to maximize his expected profit?
Identify key stakeholders that the csirt will serve : Identify and utilize existing information security technical staff and resources to support the CSIRT activities.
Experience relating to diversity management : Summary of the current event or experience relating to diversity management in the 21st century
Income taxes and real estate-property taxes : Explain how the valued added tax is shared between the central and local governments.
How much can the first national bank safely lend out : The following is a quotation from Aristotle about money; "Everything, than, must be assessed in money; for this enables men always to exchange their services.
What decisions have to be made to reach a solution : What decisions have to be made to reach a solution - What steps must be taken and Assess the potential business impact of these data quality problems

Reviews

Write a Review

Operation Management Questions & Answers

  Book review - the goal

Operations Management is about a book review. Title of the book is "Goal". This book has been written by Dr. Eliyahu Goldartt. The book has been appreciated by many as one of those books which offers an insight into the operations and strategic capac..

  Operational plan in hospitality enterprise

Operational plan pertaining to a hospitality enterprise is given in detail in the solution. The operational plan is an important plan or preparation which gives guidelines regarding the role and responsibilities of each and every operation at all lev..

  Managing operations and information

Recognise the importance of a strategic approach to the development and deployment of organisational information systems. Demonstrate an understanding of the importance of databases and their integration to the organisation's overall information mana..

  A make-or-buy analysis

An analysis of the holding costs, including the appropriate annual holding cost rate.

  Evolution and contributor of operations management

Briefly explain Evolution and contributor of Operations management.

  Functions and responsibilities of an operations manager

A number of drivers of change have transformed the roles, functions and responsibilities of an operations manager over recent years. These drivers have not only been based on technological innovations but also on the need for organisations to develop..

  Compute the optimal order quantity

Compute the Optimal Order quantity of DVD players. Determine the appropriate reorder point.

  Relationship to operations practice in the organisation

Evaluate problems in operations and identify approaches to overcoming them. Critically evaluate operating plans and identify areas for improvement. Justify, implement and evaluate changes to operations in line with modern approaches.

  A make or buy analysis

Develop a report for Figi Fabricating that will address the question of whether the company should continue to purchase the part from the supplier or begin to produce the part itself.

  Prepare a staffing plan

Prepare a staffing plan showing the change of your unit from medical/surgical staffing to oncology staffing.

  Leadership styles in different organizations

Ccompare the effectiveness of different leadership styles in different organizations

  Risk management tools and models

Be able to understand the concept of risk, roles and responsibilities for risk management and risk management tools and models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd