Ask Management Information System Expert

Assignment: Corporate Profile Part 2: Cybersecurity Risk Profile

For this paper, you will construct a cybersecurityrisk profile for the company that you wrote about in Part 1 of the Corporate Profile project. Your risk profile, which includes an Executive Summary, Risk Register, and Risk Mitigation Recommendations (Approach & Security Controls by family), will be developed from information provided by the company in its Form 10-K filing (Annual Report to Investors) retrieved from the U.S. Securities and Exchange Commission (SEC) Edgar database. You will also need to do additional research to identify security controls, products, and services which could be included in the company's risk response (actions it will take to manage cybersecurity related risk).

Research

1. Review the Risk section of the company's SEC Form 10-K. Develop a list of 5 or more specific cyberspace or cybersecurity related risks which the company included in its report to investors. Your list should include the source(s) of the risks and the potential impacts as identified by the company.

2. For each risk, identify the risk management or mitigation strategies which the company has implemented or plans to implement.

3. Next, use the control families listed in the NIST Special Publication 800-53 to identify general categories of controls which could be used or added to the company's risk management strategy for each risk in your list.

Text Book: Security and Privacy Controls for Federal Information Systems and Organizations.

4. For each control family, develop a description of how the company should implement these controls ("implementation approach") as part of its risk management strategy.

Write

1. Develop a 2 to 3 page Executive Summary from your Corporate Profile Part 1 (reuse and/or improve upon the business profile). Your Executive Summary should:

a. Provide an overview of the company and summarize its business operations.

b. Discuss the sources, potential impacts, and mitigation approach/strategy for cybersecurity related risks identified in the company's annual report.

c. End with a separate summation paragraph that provides a summary of your research and findings about the company and its cybersecurity risks.

2. Copy the Risk Register &Security Control Recommendations table (see template at the end of this assignment) to the end of the file that contains your Executive Summary.

3. Using the information you collected during your research, complete the table. Make sure that you include a name and description for each risk. For the security controls, make sure that you include the family name and a description of how each recommended control should be implemented (implementation approach). Include the control family only. Do not include individual security controls from NIST SP 800-53.

Additional Information

1. The Executive Summary should appear at the beginning of your submission file.

2. The Risk Register table should appear AFTER the Executive Summary and be placed in the SAME file.

3. The Risk Identifiers in the Risk Table are numbers that uniquely identify each risk and can be used for cross-referencing into other documents. Examples of acceptable identifiers are: 001, 002, 003 ...

Your Risk Profile is to be prepared using basic APA formatting (including title page and reference list) and submitted as an MS Word attachment to the Corporate Profile Part 2 entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples.Consult the grading rubric for specific content and formatting requirements for this assignment.

Note: for this assignment you will be preparing a very high level risk register. Preparing a fully developed risk register and risk profile is beyond the scope of this course.

--- Copy from the next line to the end of this file and paste into your deliverable --

Table 1. Risk Register &Risk Mitigation Approach with Recommended Security Controls.

Risk Identifier

Description of the Risk &
Current Risk Management Strategy

Risk Mitigation Approach with Recommended Security Controls (by NIST SP 800-53 family)

Sequence #

Must be from Form 10-K. Split complex risk statements into multiple individual risk statements.

Must explicitly include NIST Control Family (two character ID) as part of recommended mitigation.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Attachment:- Corporate-Profile-Part-1-Buyer-Profile.rar

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92459390
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Question how can company protect the new emerging

Question : How can company protect the new emerging technology ventures from profit pressures of the parent organization (APA format required, Turntin check required . Minimum 250 words essay) How do companies overcome l ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Question provide an explanation of ifwherehow does active

Question : Provide an explanation of if/where/how does Active Directory support network security,14 pages (2,000-2,500) in APA format. Include abstract and conclusion. Do not include wikis, message boards, support forums ...

Question how companies could effectively use emerging

Question : How companies could effectively use emerging technology to win over its competitors. APA format required. 250 words essay required. The response must be typed, single spaced, must be in times new roman font (s ...

Question how customers could effectively use emerging

Question : How customers could effectively use emerging technology to win over its customers. APA format required. 250 words essay required. turntin check require. The response must be typed, single spaced, must be in ti ...

Part 1 - create an 8 slide powerpoint presentation on

Part 1 - Create an 8 slide PowerPoint presentation on foundational concepts specific to physical security. Part 2 - Write 4 pages detailing the framework for the design of an integrated data center. Assessment Instructio ...

In chapter 2 of the text - managing amp using information

In Chapter 2 of the text - Managing & Using Information Systems: A Strategic Approach, the chapter discusses why information systems experience failure often because of organizational strategy. A classic example of this ...

Review at least 4 articles on balanced scorecard and

Review at least 4 articles on Balanced Scorecard and complete the following activities: 1. Write annotated summary of each article. Use APA throughout. 2. As an IT professional, discuss how you will use Balanced Scorecar ...

Data resources management questionsq1 the dama dmbok

Data Resources Management QUESTIONS Q1. The DAMA DMBOK textbook describes the following two core activities as part of the Data Architecture management exercise: "Understanding enterprise information needs" and "Develop ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As