Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Develop Cybersecurity Battle Rhythms for Fleetwings Management by walking around has been used in human organizations for a very long time. Gemba Walks focuses on

image text in transcribedimage text in transcribedimage text in transcribed
Develop "Cybersecurity Battle Rhythms" for Fleetwings Management by walking around has been used in human organizations for a very long time. Gemba Walks focuses on keeping first-person awareness of what happens at the places where people produce value with their work; a security patrol would be a similar "walk" that puts a watchful observer at each point in the organization at risk management checkpoints, where a possible security risk might occur. A battle rhythm expresses how often the "patrol" visits, inspects, checks in with, or interacts with any given set of these risk management checkpoints. This can be easily visualized or modeled as a matrix or spreadsheet, where the rows are the checkpoints, and the columns are different frequency periods, specific times of day, key events, or any other period that needs such a patrol-oriented oversight. This is a two-phase task: first, you analyze by breaking down what you know (or can safely assume) about Fleetwings and its information architectures, which you then assemble into various patrol patterns or battle rhythms. Then, you review and reflect upon those, ask questions, and draw conclusions and recommendations for your boss. Data Gathering, Simulation (by assumption), and Analysis Start creating your list of risk management checkpoints. Create 20 to 30 checkpoints as a starter set. You may need two or three columns to do this, so you can identify (or imagine!) the names of the checkpoints, their physical or logical location, the organization that logically is their "parent," owner, or manager; and the kind and datatype of each checkpoint. Later, these separate columns could let you sort by system or organization, type of checkpoint, and so on. Areas: be sure to include various system types and business activities, covering factory and building automation/process control, physical security, MIS and IT systems, and other aspects of the company. Checkpoint types can be logical, physical, or administrative. Be sure to have checkpoints of each type in your initial set. The data type of each checkpoint reflects whether it is a measurement, counter, trend indicator, peak check (low or high value captured), or other kinds of data. Use your imagination! Lay out time periods as the next set of columns. A good starter set might be "Near Real Time," "hourly," "daily (business days), "weekends and holidays," "once per week," and finally, "monthly." (Anything longer than that seems to be "long-term" monitoring, and not what the boss wants to focus on right now.) Near real-time monitoring or inspection usually requires automated sensors to detect the condition; the real issue for your battle rhythm is to identify what needs to be done, who does it, and how quickly after that condition is detected. e Please add other time periods as you think are necessary or advisable. Now, take "security patrols" across the starter set of checkpoints. Do this by vertically walking down each time period column. Leave the cell blank if you don't think that time period's patrol needs to "touch" or inspect that checkpoint. Put "inspect,\" "test," "ask," or some other verb into the cell to show what the security patrol needs to do at that checkpoint. (Note that "gather" or "record" can be assumed for each checkpoint the patrol visits.) As you do this, annotate cells with any questions, comments, or ideas that come to mind about that cell (that checkpoint or that patrol) that don't fit inside the box of the cell. Comments and notes can also highlight related issues that need further investigation and analysis. Synthesis It is recommended you take a few steps back from your spreadsheet (save it first) and take a short break. When you come back, reflect on what you went through to put it together. It's just a sample set of checkpointsFleetwings probably has tens of thousands of such risk management control points that are worth "touching base with" regularly. Capture your reflections and observations as informal talking points or notes to share with your boss. Then, make recommendations to her as to what you think should be done next and what your role in that might be. Format Use an Excel-compatible spreadsheet to create your battle rhythm planner. Your Synthesis talking points, reflections, and recommendations can either be in that same workbook file or a separate Word-compatible document

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction To Health Care Management

Authors: Sharon B. Buchbinder, Nancy H. Shanks

3rd Edition

128408101X, 9781284081015

Students also viewed these General Management questions

Question

36. Let p0 = P{X = 0} and suppose that 0 Answered: 1 week ago

Answered: 1 week ago