Demonstration of knowledge of the issues and evidence of wide reading to support your analysis · Demonstration of your ability to apply the knowledge to identify keys issues leading to your...

1 answer below »
Demonstration of knowledge of the issues and evidence of wide reading to support your analysis
· Demonstration of your ability to apply the knowledge to identify keys issues leading to your recommendations
· Evidence of sound reasoning and the exercise of professional judgement to support your recommendations
· Development and statement of concise recommendations for presentation to the Chairman
· Overall structure and professional presentation of your report to the Chairman
· High quality written communication of concepts and terms as the Chairman can be assumed to be professionally competent in corporate governance

Case Study

‘Countering cyber risk presents a significant strategic challenge to leaders across industries and sectors but one that they must surmount in order to take advantage of the opportunities presented by the vast technological advances in networked technology that are currently in their early stages. Over the past decade, we have significantly expanded our understanding of how to build secure and resilient digital networks and connected devices. However, board-level capabilities for strategic thinking and governance in thi


Document Preview:

Assessment Task 3 Length: 2,400 words total (+/- 10%) Reference list and cover sheet details are not included in this word-limit total. Weighting: 30% of total unit marks Assessment Criteria: ? Demonstration of knowledge of the issues and evidence of wide reading to support your analysis ? Demonstration of your ability to apply the knowledge to identify keys issues leading to your recommendations ? Evidence of sound reasoning and the exercise of professional judgement to support your recommendations ? Development and statement of concise recommendations for presentation to the Chairman ? Overall structure and professional presentation of your report to the Chairman ? High quality written communication of concepts and terms as the Chairman can be assumed to be professionally competent in corporate governance Case Study ‘Countering cyber risk presents a significant strategic challenge to leaders across industries and sectors but one that they must surmount in order to take advantage of the opportunities presented by the vast technological advances in networked technology that are currently in their early stages. Over the past decade, we have significantly expanded our understanding of how to build secure and resilient digital networks and connected devices. However, board-level capabilities for strategic thinking and governance in this area have failed to keep pace with both the technological risks and the solutions that new innovations provide. …. Boards have a vital governance function, determining overall company behaviour and setting a company’s risk appetite. For boards, action means effectively exercising oversight by asking managers the right questions to ensure that the boards’ strategic objectives are met. This function is no different in the area of cyber resilience. By offering the following principles and tools, the Forum hopes to facilitate useful dialogue between boards and the managers they entrust with the operation of the companies to...



Answered Same DayDec 27, 2021

Answer To: Demonstration of knowledge of the issues and evidence of wide reading to support your analysis ·...

Robert answered on Dec 27 2021
121 Votes
Contents
Executive Summary ........................................................................................................................................................... 2
Introduction ...................................................................................................................................................................... 2
Types of threat agents for cyber security .........................................................................................
................................ 2
Critically analysis of the integration of the cyber security and resilience protocols ........................................................ 3
Best practices and recommendations on how the company should initiate a cyber resilience policy ............................ 4
Conclusion ......................................................................................................................................................................... 5
References ........................................................................................................................................................................ 5
Executive Summary
This paper has looked into a discussion for addressing the topic of cyber security for the board of the company. In
view of the fact the company is trying to set up the process of improving the cyber resilience, this report will act as
the cornerstone and hence the same has attempted to critically analyse the way the company can best integrate its
cyber security and resilience protocols for ensuring continued corporate survival and improved business
performance. This report has also looked into the examples of best practice and a clear set of recommendations on
how the company should initiate a cyber resilience policy. There are various threats which are affecting the database
and information security assets and infrastructure for the modern day business entities. For restraining these
threats, it is important that the enterprises are well aware of the true nature of these threats as well as the best
practices which have to be implemented by them for ensuring the safety and security of the internal data and other
assets for the company. Also types of threat agents for cyber security is very important to be identified in view of the
fact the knowledge of the same will help the enterprise to design the protocols of cyber security. A threat agent is an
individual or an entity which tries to manifest a threat with specific abilities and may or may not have a past record
of similar activities. For the enterprise it is of utmost importance to be conscious regarding the cyber security threats
in addition to causing parties of the same to identify if any specific threat is coming from any specific threat agent
group or not. This in turn helps in deciding on the policy of the cyber resilience. With the risk-based approaches
which can focus on managing the “precise risks” in the “correct ways,” the company needs to take tough decisions
which are based on the evidence. The company needs to aim to take into account the transactions, connections, and
relationships existing between all the entities within the cyber ecosystem in which they reside.
Introduction
In this paper a discussion will be carried out for addressing the topic of cyber security for the company board. As an
initial step in the process of improving the cyber resilience of the company, this report has been prepared which will
critically analyse how the company can best integrate its cyber security and resilience protocols to ensure continued
corporate survival and improved business performance. Also this report will be looking into the examples of best
practice and a clear set of recommendations on how the company should initiate a cyber resilience policy.
There are various threats which are affecting the database and information security assets and infrastructure for the
modern day business entities. For restraining these threats, it is important that the enterprises are well aware of the
true nature of these threats as well as the best practices which have to be implemented by them for ensuring the
safety and security of the internal data and other assets for the company. There are various threats in the online
space as well as related to computer security those are needed to be considered while integrating the cyber security
and resilience protocols for ensuring that the company can continue its corporate survival and improved business
performance. Also in view of the fact that this is a very dynamic field and the nature of threats are changing rapidly
with the introduction of new threats and trends for the data security it is important for the entities to ensure that
the best practice and a clear set of recommendations are laid clearly for following the same in the future.
In this report the factors which will be looked into are the following:...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here