Tag Archives: suspicious behavior

Key controls for cyber breach. 2022 Best

Key controls for cyber breach.

For this assignment we will explore Key controls for cyber breach. Paper details: You are the CRO of LIFT, a global ride sharing service. At 9:00 AM, you notice in today’s newspaper that your main competitive rival, U-Beer has just been hit with a cyber breach.

Key controls for cyber breach.

List 4 key controls. Paper details: You are the CRO of LIFT, a global ride sharing service. At 9:00 AM, you notice in today’s newspaper that your main competitive rival, U-Beer has just been hit with a cyber breach. The root cause of the action was employee misconduct and the inappropriate misuse of company funds to pay off hackers who had breached security parameters and gained access to customer private data. The employees failed to escalate or notify anyone in internal management of the breach until the event was made public. U-Beer has since removed its CISO and is in full-blown crisis management mode as public concern around the situation has escalated.

Key controls for cyber breach.

At 10:00 AM, you get a call from the CEO of LIFT (Your boss) asking for more details on the situation at U-Beer and whether this type of incident could occur at LIFT. You commit to do an analysis of the situation and report back by 5:00 PM to the CEO. To Do’s for the Assignment: 1. Determine a list 10 key controls LIFT has in place (Preventative or Detective) to prevent a similar event from happening at your organization (Assume the controls you select exist already at the company). Use COSO ERM Cube as Guide). Map the 10 controls you select in a table.

Key controls for cyber breach.

Describe each control, whether its preventative or detective, where it applies in the organization and how is it classified (top of the cube). I will be grading you on specificity provided on each control and descriiption and applicability. (you only need to list 4 key controls, each should have 100 to 150 words, and I have already found four controls for you). 2. Four key controls: 1. Disaster recovery plan (Disaster means the worst situation) 2. Insurance 3. Back up systems (e.g. Physical control system) 4. Detective (tech: identify and investigate suspicious behavior, to notify risk before it escalates; when employees found the risk, they can tell their superior directly.).https://youtu.be/as9vmPtV2rg

Attached Files

 |

Powered by WordPress and MagTheme