Reference no: EM133066657
Step 1: Prepare a Scope of Work Overview
As a recent Graduate, Master's in Cybersecurity program, you have received a well-deserved promotion to chief information security officer (CISO) at the global financial institution where you work. The role is new for you and the company. It reports directly to the chief information officer (CIO), which for the purposes of this course, is the instructor. Much of what you will be doing in the next couple of months is centered around the policy aspects of the bank.
The CIO has lobbied for your role to be created as a result of four concerns that will require your expertise and focus. In general, you are told you will be addressing the following four projects:
• Mobile Device Management (MDM)
• Identity Theft
• Digital Currency
• Enterprise Policy
Now that you have an idea of the tasks ahead, the first project will be developing recommendations for mobile device management, which will include written comments and a presentation for the company's leadership. This is the first of four sequential projects in this course and should be completed in about two weeks. There are 11 steps to complete in Project 1. Contact the CIO (your instructor) with any questions. Proceed to Step 1 to begin.
Since the CEO has agreed for you to update the company's mobile device management (MDM) Policy, the CIO has requested you first provide a scope of work to determine the level of effort that your team will face.
Prepare an overview of the scope of work by posting a brief paragraph (three to five sentences) explaining the approach and deliverable for this project with a few bullet points that address general financial industry concerns with cybersecurity and MDM.
Step 2: Research Critical Infrastructure Concerns
After defining the scope of work, you are ready to begin updating the MDM policy. In order to determine the effectiveness of the current policy, research what critical infrastructure protection concerns affect compliance.
Consider the following list to guide your research:
• impact of cyberattacks on critical infrastructure as defined by the Patriot Act of 2001
• technologies used in critical infrastructure cyberattacks
• cybersecurity defense principles that should be used to counter these cyberattacks
• cybersecurity policy framework that should be employed to minimize the opportunity for a successful critical infrastructure cyberattack
Document the findings since they will be used in upcoming steps. In the next step, you will itemize those concerns.
Step 3: Itemize Critical Infrastructure Concerns
Using notes taken from the completed research in the last step, itemize the findings in a table or spreadsheet titled Crucial Concerns Worksheet that assesses:
• The impact of cyberattacks on critical infrastructure as initiated by the Patriot Act of 2001 and later refined by the Department of Homeland Security (DHS).
• The technologies used in critical infrastructure cyberattacks. Especially consider which and how technologies may exploit mobile device vulnerabilities.
• Cybersecurity defense principles should be used to counter these cyberattacks.