Assessment Task 3 Due Date:Sunday 7 September 2018 Length:2,400 words total (+/- 10%) Reference list and cover sheet details are not included in this word-limit total. Weighting:30% of total unit...

1 answer below »
case study


Assessment Task 3 Due Date:Sunday 7 September 2018 Length:2,400 words total (+/- 10%) Reference list and cover sheet details are not included in this word-limit total. Weighting:30% of total unit marks Assessment Criteria: · Demonstration of knowledge of the issues and evidence of wide reading to support your analysis · Demonstration of your ability to apply the knowledge to identify keys issues leading to your recommendations · Evidence of sound reasoning and the exercise of professional judgement to support your recommendations · Development and statement of concise recommendations for presentation to the Chairman · Overall structure and professional presentation of your report to the Chairman · High quality written communication of concepts and terms as the Chairman can be assumed to be professionally competent in corporate governance Case Study ‘Countering cyber risk presents a significant strategic challenge to leaders across industries and sectors but one that they must surmount in order to take advantage of the opportunities presented by the vast technological advances in networked technology that are currently in their early stages. Over the past decade, we have significantly expanded our understanding of how to build secure and resilient digital networks and connected devices. However, board-level capabilities for strategic thinking and governance in this area have failed to keep pace with both the technological risks and the solutions that new innovations provide. Boards have a vital governance function, determining overall company behaviour and setting a company’s risk appetite. For boards, action means effectively exercising oversight by asking managers the right questions to ensure that the boards’ strategic objectives are met. This function is no different in the area of cyber resilience. By offering the following principles and tools, the Forum hopes to facilitate useful dialogue between boards and the managers they entrust with the operation of the companies to which they owe their fiduciary obligations.’ 7 Source: World Economic Forum (2017), Advancing Cyber Resilience: Principles and Tools for Boards, http://www3.weforum.org/docs/IP/2017/Adv_Cyber_Resilience_Principles- Tools.pdf Required Assume you have been employed as a corporate governance consultant by a company listed on the Australian Stock Exchange and ranked within the ASX 200. The Chairman of the company has decided to address the issue of cyber security at the company board level. As an initial step in the process of improving the cyber resilience of the company the Chairman has employed you to prepare a report that critically analyses how the company can best integrate its cyber security and resilience protocols to ensure continued corporate survival and improved business performance. The Chairman has requested that you submit a report providing examples of best practice and a clear set of recommendations on how the company should initiate a cyber resilience policy at the corporate board level. Your report will be tabled at the next board meeting for board members to review and evaluate your recommendations.
Answered Same DaySep 02, 2020

Answer To: Assessment Task 3 Due Date:Sunday 7 September 2018 Length:2,400 words total (+/- 10%) Reference...

Sarabjeet answered on Sep 05 2020
167 Votes
Cyber security and resilience
Cyber security and resilience
Student Name
University Name
Contents
Introduction    2
Integrate its cyber security and resilience protocols to ensure continued corporate survival and improved business performance    2
The following practices are essential to achieving digital resilience:    5
Aligning business continuity and cyber security response    7
Company should initiate a cyber resilience policy at the corporate board level    10
Recommendations    10
Conclusion    11
References    12
Introduction
Cybercrime objection represents an important strategic challenge for leaders across the industry and for different b
usiness sectors, but one thing that every company must surmount to take advantage of different opportunities posed by the major technological advances in the network technology. Boards have a vital function of governance, defining the overall behavior of the company and setting a company's risk appetite. For boards, action means effectively exercising oversight by asking managers the right questions to ensure that the strategic objectives of the boards are met. As a corporate governance consultant from a listed Australian Stock Exchange listed in the ASX 200, this report is prepared to critically analyze how the company can better integrate its Internet security protocols and resilience to its ensuring continued corporate survival and improved business performance.
Integrate its cyber security and resilience protocols to ensure continued corporate survival and improved business performance
Proactive Prevention with a Focus on Cyber Resilience
It is essential for company to take several steps to protect organization from hacking. In fact, the Internet Security Center prevents cyber attacks by up to 80%:
· Make a list of authorized and unauthorized devices
· Create a list of authorized and unauthorized software
· Develop and manage security configurations for all devices
· Continuous (automatic) vulnerability assessment and solutions
· Active management and control over the use of administrative authority
Unfortunately, every attack still has the potential to withstand attacks. The longer company know about the attack, the longer they secure themselves from the cyber attack. Even well-known companies do not know immediately that they have been violated. But those who are ready for such incidents will be better than those who are not prepared. Just as the fire drill can save lives on a real train, similarly it can make a big difference to publicly make public after the company is prepared for the consequences of cyber attacks and how many officials and board members violate it (Darling, 2016).
The good news is that creating a network flexible action plan is a step-by-step process that can be done by any company that wants to invest time and resources. And, make sure that you have a good cleanliness of the system; the next step is to combine to determine the details. The working groups should include cross-functional senior executives (Sales and Marketing, IT, Finance, Law, Risks, Human Resources etc.), which should meet regularly to discuss each cybersecurity and develop threats from the company (seen) Unique perspectives), and the establishment once involved participating in modeling and analysis of fictitious attacks S, the company can continue to develop a plan to assess the risk profile of the company's first cyber. Recent studies concluded that 95% of cyber attacks can be analyzed in nine basic modes. Deep studies of patterns with the help of external cyber security experts can help to determine whether their company is most vulnerable. Type; It can then be cautious in accordance with these samples (de Crespigny, 2012). The team needs to develop a hypothetical situation to help identify the details of potential attack patterns, objectives, vulnerabilities and consequences to be more intensified. This is not necessary; in fact, the need for this exercise is very harmful. Before the incident, no one can figure out how much the loss would be due to the loss of revenue, loss of prestige, or the failure of a stockholder's stock. All things required are rough, enabling the team to provide adequate and potential harm, to reduce risk reduction policy. This strategy will include steps to reduce losses of sophisticated targets. For example, if a company decides that its biggest loss is in the point-of-sale software system that has multiplayer installation, by which the home operator is guided by the seller's access, then they may consider investing in end-to-end encryption, AWL, FIM, System Access Software, Vendor Access Control logs and periodic inspection access to all vendors (Deschaux-Dutard, 2016).
It's important to realize that you can't completely mitigate network attacks. In these cases, having the right cyber insurance can make your company behave differently in the days, weeks, and months after a successful attack. When a cybersecurity incident occurs, cyber insurance can provide key funding and expert assistance. The company may also wish to obtain director and officer (D&O) liability insurance to protect board member company officials from negligence claims after default. In addition, they may wish to review their property, casualties, and business disruption coverage to ensure adequate protection against successful cyber attacks on the company's infrastructure. Fortunately, this type of attack is rare so far. However, such attacks are not unheard of, and given the current geopolitical instability, the possibility of such attacks is growing, especially for multinational companies exposed in more sensitive countries around the world. By taking the above steps, companies can increase their network resiliency and better locate them to recover quickly from successful cyber attacks (Horowitz and Lucero, 2016).
The new solution occupies the main part of the Enterprise Network Protection. The main components of the product are as follows:
Network Relational Assessment: Network Security Professionals will evaluate the cybersecurity status of interested customers and propose ways to improve their cybersecurity confederation.
Network insurance: Allianz has evaluated the technical aspects of the solution and determined that customers using Cisco ransomware Defense and/or CleiLied company products are eligible for Enhanced Network Insurance Products developed and acknowledge the superior cover...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here