Auditors certify (accredit) an organization’s compliance. Often organizations will negotiate with the auditor for more favorable findings or to accept mitigating controls. Identify how negotiations with accreditors on compliance should be dealt with and provide an example. Describe appropriate response strategies that can be put into action (i.e., breach notification policies). Explain employee training recommendations for creating awareness of the organization’s security measurements. Define how to obtain feedback on the effectiveness of security policies from stakeholders and provide an example. Describe how to identify new threats, vulnerabilities, and risk management (including backups and recovery), or any countermeasures that may not have been accounted for when the initial security measures were first implemented. Identify mechanisms to adapt to threat intelligence, which identifies new and overlooked vulnerabilities, threats, and countermeasures. Explain how this would be reported and communicated. Explain how operational managers, stakeholders, and/or individuals affected by new threat intelligence will be notified and provide examples for each notification method. Identify organization management techniques to respond quickly to new challenges. Define and apply the NIST cybersecurity framework functional areas, implementation tiers, and profiles. Describe how to develop a business continuity plan to prevent and recover from failures in the system. Note: Retain a copy of this assignment for the Business Continuity Plan, which will be finalized and submitted in either CYB-690 or ITT-660, depending on your major. Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations
Assessment Description:
Prior to or when security measures fail, it is essential to have several response strategies in place.
As a final part of the Impact Analysis, write a 1,300- to 1,500-word prevention and response plan that addresses the following:
Auditors certify (accredit) an organization’s compliance. Often organizations will negotiate with the auditor for more favorable findings or to accept mitigating controls. Identify how negotiations with accreditors on compliance should be dealt with and provide an example.
Describe appropriate response strategies that can be put into action (i.e., breach notification policies).
Explain employee training recommendations for creating awareness of the organization’s security measurements.
Define how to obtain feedback on the effectiveness of security policies from stakeholders and provide an example.
Describe how to identify new threats, vulnerabilities, and risk management (including backups and recovery), or any countermeasures that may not have been accounted for when the initial security measures were first implemented.
Identify mechanisms to adapt to threat intelligence, which identifies new and overlooked vulnerabilities, threats, and countermeasures. Explain how this would be reported and communicated.
Explain how operational managers, stakeholders, and/or individuals affected by new threat intelligence will be notified and provide examples for each notification method.
Identify organization management techniques to respond quickly to new challenges.
Define and apply the NIST cybersecurity framework functional areas, implementation tiers, and profiles.
Describe how to develop a business continuity plan to prevent and recover from failures in the system.
Note: Retain a copy of this assignment for the Business Continuity Plan, which will be finalized and submitted in either CYB-690 or ITT-660, depending on your major.
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.