Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

SAGE Books is a retail bookseller that provides customers with a one-stop-shopping experience for books, magazines, and multimedia (music, DVDs, and Blu-ray). During a recent

SAGE Books is a retail bookseller that provides customers with a one-stop-shopping experience for books, magazines, and multimedia (music, DVDs, and Blu-ray). During a recent board meeting, the discussion centered on how the company can improve its operations and secure its information and information systems. Board members focused on enhancing SAGEs e-commerce website, keeping cybersecurity at the forefront of its new website design and marketing plan. As a result of this meeting, the board decided to have an independent assessment of the cybersecurity posture of the company. The assessment was completed by Secure Tech Solutions. This organization uncovered a number of issues with SAGE Books's security program and sent a security report detailing what was found. (See the Independent Security Report supporting document.) As SAGE Books's chief information security officer (CISO), you act as the leader of the cybersecurity department. You are required to review the report and write SAGE Books's response to the proposed security improvements. You must determine the appropriate actions to take, resulting in a plan for fixing the revealed issues. Your response must be provided in a written report outlining the ways SAGE Books will improve security. This report will be given to the board of directors and upper management, including the chief executive officer (CEO).

A. Summarize the gaps that exist currently in the companys security framework as described in the attached Independent Security Report.

B. Develop mitigation strategies to address the gaps identified in the Independent Security Report, ensuring compliance with PCI DSS and GDPR.

C. Identify three critical security staff positions and the responsibilities for each position, which must be hired to meet compliance, risk, and governance requirements using the NICE Framework discussed in the Independent Security Report.

D. Describe at least three physical vulnerabilities and/or threats and at least three logical vulnerabilities and/or threats and how each impacts the security posture of the company based on the attached Company Overview document and Independent Security Report.

E. Develop a cybersecurity awareness training program in alignment with NIST standards, including the following:

annual training requirements

specialized training requirements

continued awareness

F. Summarize the standards required for securing organizational assets regarding policies for acceptable use, mobile devices, passwords, and personally identifiable information (PII), using regulatory or contractual sources to support your claims.

G. Develop an incident response plan for the company in alignment with the attached Independent Security Report, following the four incident handling phases according to NIST standards.

H. Develop a business continuity plan (BCP) to address potential natural disasters as described in the Independent Security Report, including the following phases:

project scope and planning

business impact analysis

continuity planning

plan approval and implementation

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Project Management A Managerial Approach

Authors: Jack R. Meredith, Samuel J. Mantel,

7th Edition

470226218, 978-0470226216

More Books

Students also viewed these General Management questions

Question

=+ What do you think about the Feds recent policy decisions?

Answered: 1 week ago

Question

How are operations on files or directories handled?

Answered: 1 week ago

Question

WHAT IS AUTOMATION TESTING?

Answered: 1 week ago

Question

What is Selenium? What are the advantages of Selenium?

Answered: 1 week ago

Question

Who did you wish to speak to?

Answered: 1 week ago