Answer To: Assessment Task 3 Due Date:Sunday 7 September 2018 Length:2,400 words total (+/- 10%) Reference...
Sarabjeet answered on Sep 05 2020
Cyber security and resilience
Cyber security and resilience
Student Name
University Name
Contents
Introduction 2
Integrate its cyber security and resilience protocols to ensure continued corporate survival and improved business performance 2
The following practices are essential to achieving digital resilience: 5
Aligning business continuity and cyber security response 7
Company should initiate a cyber resilience policy at the corporate board level 10
Recommendations 10
Conclusion 11
References 12
Introduction
Cybercrime objection represents an important strategic challenge for leaders across the industry and for different business sectors, but one thing that every company must surmount to take advantage of different opportunities posed by the major technological advances in the network technology. Boards have a vital function of governance, defining the overall behavior of the company and setting a company's risk appetite. For boards, action means effectively exercising oversight by asking managers the right questions to ensure that the strategic objectives of the boards are met. As a corporate governance consultant from a listed Australian Stock Exchange listed in the ASX 200, this report is prepared to critically analyze how the company can better integrate its Internet security protocols and resilience to its ensuring continued corporate survival and improved business performance.
Integrate its cyber security and resilience protocols to ensure continued corporate survival and improved business performance
Proactive Prevention with a Focus on Cyber Resilience
It is essential for company to take several steps to protect organization from hacking. In fact, the Internet Security Center prevents cyber attacks by up to 80%:
· Make a list of authorized and unauthorized devices
· Create a list of authorized and unauthorized software
· Develop and manage security configurations for all devices
· Continuous (automatic) vulnerability assessment and solutions
· Active management and control over the use of administrative authority
Unfortunately, every attack still has the potential to withstand attacks. The longer company know about the attack, the longer they secure themselves from the cyber attack. Even well-known companies do not know immediately that they have been violated. But those who are ready for such incidents will be better than those who are not prepared. Just as the fire drill can save lives on a real train, similarly it can make a big difference to publicly make public after the company is prepared for the consequences of cyber attacks and how many officials and board members violate it (Darling, 2016).
The good news is that creating a network flexible action plan is a step-by-step process that can be done by any company that wants to invest time and resources. And, make sure that you have a good cleanliness of the system; the next step is to combine to determine the details. The working groups should include cross-functional senior executives (Sales and Marketing, IT, Finance, Law, Risks, Human Resources etc.), which should meet regularly to discuss each cybersecurity and develop threats from the company (seen) Unique perspectives), and the establishment once involved participating in modeling and analysis of fictitious attacks S, the company can continue to develop a plan to assess the risk profile of the company's first cyber. Recent studies concluded that 95% of cyber attacks can be analyzed in nine basic modes. Deep studies of patterns with the help of external cyber security experts can help to determine whether their company is most vulnerable. Type; It can then be cautious in accordance with these samples (de Crespigny, 2012). The team needs to develop a hypothetical situation to help identify the details of potential attack patterns, objectives, vulnerabilities and consequences to be more intensified. This is not necessary; in fact, the need for this exercise is very harmful. Before the incident, no one can figure out how much the loss would be due to the loss of revenue, loss of prestige, or the failure of a stockholder's stock. All things required are rough, enabling the team to provide adequate and potential harm, to reduce risk reduction policy. This strategy will include steps to reduce losses of sophisticated targets. For example, if a company decides that its biggest loss is in the point-of-sale software system that has multiplayer installation, by which the home operator is guided by the seller's access, then they may consider investing in end-to-end encryption, AWL, FIM, System Access Software, Vendor Access Control logs and periodic inspection access to all vendors (Deschaux-Dutard, 2016).
It's important to realize that you can't completely mitigate network attacks. In these cases, having the right cyber insurance can make your company behave differently in the days, weeks, and months after a successful attack. When a cybersecurity incident occurs, cyber insurance can provide key funding and expert assistance. The company may also wish to obtain director and officer (D&O) liability insurance to protect board member company officials from negligence claims after default. In addition, they may wish to review their property, casualties, and business disruption coverage to ensure adequate protection against successful cyber attacks on the company's infrastructure. Fortunately, this type of attack is rare so far. However, such attacks are not unheard of, and given the current geopolitical instability, the possibility of such attacks is growing, especially for multinational companies exposed in more sensitive countries around the world. By taking the above steps, companies can increase their network resiliency and better locate them to recover quickly from successful cyber attacks (Horowitz and Lucero, 2016).
The new solution occupies the main part of the Enterprise Network Protection. The main components of the product are as follows:
Network Relational Assessment: Network Security Professionals will evaluate the cybersecurity status of interested customers and propose ways to improve their cybersecurity confederation.
Network insurance: Allianz has evaluated the technical aspects of the solution and determined that customers using Cisco ransomware Defense and/or CleiLied company products are eligible for Enhanced Network Insurance Products developed and acknowledge the superior cover...