Develop a project presentation that synthesizes an effective and ethical cybersecurity solution. Describe your decision analysis for your project. Course O
Unit Outcomes:
- Develop a project presentation that synthesizes an effective and ethical cybersecurity solution.
- Describe your decision analysis for your project.
Course Outcome:
IT595-4: Decision Analysis: Analyze data using accepted best practices for the purpose of synthesizing an effective and ethical cybersecurity solution.
Purpose
You are almost done! It is time to present your project to the stakeholders. Imagine you are standing right in front of them. You will put together a PowerPoint presentation that includes your audio narration. Remember, good communication skills are important for professional success and especially in cybersecurity. Good luck!
Assignment Instructions
Develop a project presentation to stakeholders.
Imagine your project has been completed and it is time to present a summary of it to the project stakeholders. You will prepare a professional PowerPoint presentation. If you want to use another presentation tool, please consult your instructor.
The presentation will also contain audio narration for each slide and a script for the narration in the notes section of the slide. The presentation should contain at least 25 SLIDES covering the purpose of the project, detailed descriptions of each milestone, your decision analysis throughout the project, industry best practices used, and finally why you think your solution is effective and ethical.
The rubric will provide further instructions on specific requirements for the assignment.
Assignment Requirements
You should follow current APA format, if appropriate.
PLEASE USE ATTACHED FOR THE INFORMATION FOR THE MILESTONES. 25 SLIDES MINIUMUM! AND A TRANSCRIPT FOR EACH SLIDE
Unit 1 Assignment 1
Unit 1 Assignment 1
Unit 1 IT595
Clifford Shells
Purdue University Global
IT595: Master’s Capstone in Cybersecurity Management
December 8, 2024
Introduction
As cyber threats continue to evolve and become more pronounced, higher levels of security in organizational contexts have become relevant. Organizations must proactively manage employee stress, persistent skills shortages, budgetary constraints, and rising cyber risks as cyber threats increase in complexity and frequency. The cybersecurity landscape is changing more quickly than ever, according to ISACA's 2024 State of Cybersecurity report, which compiled opinions from 1,868 cybersecurity experts globally. Endpoint security has become an issue of concern since most endpoints- laptops, smartphones, workstations, and others are central to most breaches (McKinsey & Company, 2022). This proposal provides a broad plan to address a core goal of the organization, the protection of endpoint devices through a zero-trust security design. Identity verification, micro-segmentation, and advanced threat vector identification are proposed as innovative principles to reduce risks associated with topping and data leakage to reflect modern approaches to cybersecurity.
Background of Organization
The proposed project will be based on a mid-sized financial services company with around 500 employees following a hybrid working modality. The described organization's efficiency correlates with the need to protect confidential financial information exchanged between employees, clients, and partners. The company’s most recent penetration test established serious weaknesses in its endpoint protection, especially in client devices (Kamruzzaman et al., 2022). These security gaps can lead to an elevated risk towards data integrity, non-compliance with regulations such as the GDPR, and a profound impact on the organization's reputation.
Problem
Conventional security based on the perimeter has not been adequate to guard organizations against new cyber threats. Devices ranging from laptops and tablets to wearables and smart speakers are now susceptible to endpoint security hazards, and network-connected printers can even be dangerous for businesses.
The increase in flexible work arrangements has contributed to the proliferation of endpoint devices. The prevalence of remote work has increased, and companies depend more on software solutions to collaborate with outside partners. However, because of their weaknesses, these endpoints are increasingly popular targets for hackers. As a result, IT teams now prioritize monitoring and mitigating endpoint security threats. Endpoint security used to be extremely easy: businesses would set up a secure network perimeter, assign and monitor devices, and keep a patching procedure in place to keep systems updated (Chandel et al., 2019).
However, the proliferation of linked devices, whether personal or company-issued, presents unique security challenges for enterprises today. Along with the expansion of devices, there is a persistent threat to IT environments. Even the biggest teams entrusted with monitoring and eliminating these threats are overwhelmed by the hundreds of thousands of new malware varieties that are discovered every day. Remote access to organizational resources and the increased use of BYOD policies only increases these weaknesses. Several gaps in endpoint security management have exposed the organization to APT, phishing, and ransomware threats. The lack of efficient, centralized, trust-based access control is an added problem that cannot be addressed without migrating to a stronger security paradigm.
Purpose of Project
This project aims to mitigate the endpoint security risks mentioned by deploying the Zero Trust security model. This approach, which follows the motto “never trust, always verify,” will require tight identity checks and continuous monitoring of all endpoint devices. Through adopting advanced tools like the MFA and EDR, the project seeks to establish a strong security posture that checks and validates users and endpoints continuously accessing organizational resources.
Endpoint Detection and Response (EDR), sometimes referred to as endpoint detection and threat response (EDTR), is an endpoint security solution that offers ongoing user device monitoring to detect and stop cyber threats like malware and ransomware (Karantzas & Patsakis, 2021). EDR is described as a system that "records and saves endpoint-level activities, employs various data analysis methods to spot suspicious behavior, offers contextual insights, prevents harmful actions, and suggests ways to recover affected systems." Furthermore, by demanding several pieces of identity upon account registration, multi-factor authentication improves security (Suleski et al., 2023). This data is stored by the system so that it can validate the user on future login attempts.
Stakeholders
The project's success will also depend on the full involvement of many stakeholders. Internal stakeholders include the IT department, security departments, directors/CEOs, and others who rely on the end-user devices to perform their activities. External stakeholders, including technology vendors and cybersecurity consultants, will be pivotal in delivering the tools and expertise as the implementation occurs. Regulatory agencies are also helpful for the project since the completed work must conform to the existing norms and standards of the field.
High-Level Costs Associated with the Project
Introducing the Zero Trust security model will cost a budgetary estimate of ninety-five thousand US Dollars. This includes Risk assessment costs ($15000), cost of acquisition of Security tools and technologies including EDR and IAM ($40000), costs in deployment and testing ($25000), and lastly, costs in training employees and documenting procedures ($10000) (Homeland Security, 2023). An additional $ 5000 has also been provided under contingency to meet any unanticipated expenses during the fiscal year. Although the expenses may seem high initially, the long-term advantages of avoiding cyber risks and maintaining compliance overshadow it.
Expected Outcomes of the Project
It should also be noted that the proposed Zero Trust security framework will produce several tangible and intangible outcomes. Some outcomes include fewer security attacks that target endpoints, high compliance with regulatory requirements on data protection, and more effective and secure access controls for users. The project will also help strengthen the organization by establishing it as a pioneer in implementing innovative cybersecurity mechanisms for generating confidence among clients and partners.
Risks to Project Completion and Proposed Mitigations
Several risks may exist and function as obstacles to the successful completion of this project. Employees and stakeholders can also resist the change; hence, it is a challenge that can be managed through education and training and constantly informing them of the gains of the change. Interoperability issues with existing structures often require final checks to assess the congruence before implementation (Huang et al., 2020). Another risk includes the challenges of incurring costs beyond the budgeted amounts, but a competent monitoring of costs and having a contingency fund will minimize this. Last, security during the transition phase is critical and must be conducted by retaining the previous measures until the new system entirely takes shape.
Milestone 1: Project Launch
The first phase focuses on the project's initiation phase through planning and consulting with the stakeholders involved. This phase will initiate meetings to assess and describe the security vulnerabilities in the currently deployed endpoint architecture (Chandel et al., 2019). Each project shall have a clear charter, including the specific deliverables, goals, and expected results. The planning phase will also involve the development of a work schedule and responsibilities, as well as measures of checking the accomplishments made during its execution. This way, all the key stakeholders are on the same page regarding implementing the envisaged project, creating a platform for effective and efficient implementation.
Milestone 2: Risk Assessment & Architecture Design
The second model evaluates the risk and defines the dangerous areas and threats at the organization's endpoint. The assessment will include monitoring network traffic, reading the access logs, and regularly testing potential attack scenarios. Consequently, an appropriate Zero Trust architecture compatible with the organization’s settings will be developed. Some design features are micro-segmentation to reduce the possibility of lateral movement, implementation of MFA to enhance the access controls, and choosing EDR for accurate time threat identification. Scalability will also be considered in the architectural design to allow for growth within the organization in the future.
Milestone 3: Implementation and Testing
The third and final milestone is the implementation of Zero Trust as a security model and conducting tests to assess its efficiency. The steps will involve deploying and setting up some of the chosen tools and technology within existing systems. The system's security will also be assessed using the process referred to as penetration testing. Furthermore, there will be a User Acceptance Testing to capture feedback and fix some problems with the product's usability. This milestone emphasizes iterative testing and improvement that confirms that the deployed system is operational and technically functional.
Milestone 4: Describe in Detail
The last stage is assessing the deployed system's success and fine-tuning the system based on the actual information gathered from the field and consumers. Specific indicators, such as the depreciation of the attempts made by unauthorized personnel and the time required to identify and tackle threats, will be thoroughly monitored through continuous monitoring tools. Such training sessions will be necessary to introduce employees to the new system and to stress security problems and precautions. So, creating and submitting the comprehensive project report is an integral part of the project to describe the results and recommendations for further improvement. This project's last step leaves the organization ready to protect itself from increased threats with time.
Conclusion
The adoption of Zero Trust security architecture for endpoint protection is hailed as a milestone in mitigating cybersecurity risks that confront current businesses. As a result, risks would be reduced, and compliance would be improved by engaging in the latest technologies alongside promoting security awareness within this project. The specific tasks listed in this proposal make clear the steps that must be undertaken to implement the plan of action, guarantee the achievement of organizational goals, and comply with best practices. Lastly, the project aims to develop a long-term sustainable cybersecurity model to protect the organization’s assets and reputation.
References
Chandel, S., Yu, S., Yitian, T., Zhili, Z., & Yusheng, H. (2019). Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat. 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). https://doi.org/10.1109/cyberc.2019.00023
Homeland Security. (2023). FY 2024 Budget in Brief. https://www.dhs.gov/sites/default/files/2023-03/DHS%20FY%202024%20BUDGET%20IN%20BRIEF%20%28BIB%29_Remediated.pdf
Huang, C., Koppel, R., McGreevey, J. D., Craven, C. K., & Schreiber, R. (2020). Transitions from One Electronic Health Record to Another: Challenges, Pitfalls, and Recommendations. Applied Clinical Informatics, 11(05), 742–754. https://doi.org/10.1055/s-0040-1718535
Kamruzzaman, A., Ismat, S., Brickley, J. C., Liu, A., & Thakur, K. (2022, December 1). A Comprehensive Review of Endpoint Security: Threats and Defenses. IEEE Xplore. https://doi.org/10.1109/ICCWS56285.2022.9998470
Karantzas, G., & Patsakis, C. (2021). An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors. Journal of Cybersecurity and Privacy, 1(3), 387–421. https://doi.org/10.3390/jcp1030021
McKinsey & Company. (2022, March 10). Cybersecurity trends: Looking over the horizon | McKinsey. Www.mckinsey.com. https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity/cybersecurity-trends-looking-over-the-horizon
Suleski, T., Ahmed, M., Yang, W., & Wang, E. (2023). A Review of multi-factor Authentication on the Internet of Healthcare Things. Digital Health, 9(1). https://doi.org/10.1177/20552076231177144
,
Unit 9 Assignment 1
Unit 9 Assignment 1
Unit 9 IT595
Clifford Shells
Purdue University Global
IT595: Master’s Capstone in Cybersecurity Management
February 10, 2025
Milestone 4: Assessment and Finalization – Status Report
Milestone 4 entails the final stage of the cybersecurity project and aims at assessing the implemented system's efficiency to achieve any adjustments. This stage focuses on reviewing the attempts made by unauthorized people, detecting the times taken to respond to the threats, and providing feedback on the users' sessions. This will guarantee that the organization is ready to manage new threats arising within the new future occasionally.
figure 1 Configuration of the Network Security System
Recommendations for Stakeholders
Enhanced continuous monitoring requires artificially intelligent technologies that are used to surveillance and prevent threats to computers in real-time (Aminu, Akinsanya, Dako, & Oyedokun, 2024). Using machine learning techniques, organizations can identify bumps quickly enough, thus ensuring a faster response and preventing losses from the resulting impacts. In addition, using SIEM enhances the monitoring of logs, which means overall monitoring is achieved and made effective.
Zero Trust Enforcement enhances the authentication process by implementing MFA and applying zero trust principles with micro-segmentation (Patel & Chaudhary, 2024). Some measures that organizations should implement include identity-based access control and context-awareness authentication to exclude unauthorized access. Role-based access and just-in-time privilege escalation are good practices as they minimize the exposure to potential threats.
Being aware of common threats that may arise due to employee negligence, employee training programs organize recurring cybersecurity sessions to refresh employees on the relevant preventive measures. Employees must comprehend the objectives of phishing attacks and social engineering within an organization and the safer approach to passwords to minimize threats.
figure 2 Monitoring Logs & Performance Metrics
Tasks Completed (Updated WBS)
Task |
Planned Duration (Days) |
Actual Duration (Days) |
Notes |
Deployment of Continuous Monitoring Tools |
5 |
6 |
Additional testing required |
System Performance Evaluation |
4 |
5 |
Adjustments to security settings needed |
User Training Sessions |
3 |
3 |
Completed as planned |
Final Penetration Testing |
5 |
6 |
Extra retesting for vulnerabilities |
Documentation & Reporting |
2 |
2 |
Finalized and submitted |
Lessons Learned
Point five of the Importance of Real-Time Monitoring states that automated threat identification improves response to threats (Aminu, Akinsanya, Dako, & Oyedokun, 2024). One of the benefits of implementing artificial intelligence and machine learning for analytical predictions is that it provides organizations with the necessary tools to consider threats before they become problematic. Besides, monitoring across different system layers provides a more thorough outlook on security issues.
The article User Engagement is Key also acknowledges that active engagement in the training sessions minimizes compliance with risks and openings (Silic & Lowry, 2020). End-user awareness is also important within the organization; hence, it is reassuring that the employees are trained to embrace a good working culture to curb cyber threats. Such incentives can be used supplementarily to engage the learner further and reinforce the training session’s content.
The reasons stated in the topic 'Stakeholder Communication is Vital' state that feedback loops are used for increased system effectiveness and to meet the demands of real-life situations to improve stakeholder communication. Business institutions seeking clear communication with stakeholders such as IT departments, managerial level, and customers will be uniquely positioned to implement security solutions in response to their requirements. Such security implementations will be more accomplished by doing regular security briefings and collaborative sessions and making decisions.
figure 3 Creating a Data Breach Response Plan
Conclusion
Hence, Milestone 4 assessed the system's effectiveness, adjustment of securities, and approximation for future cybersecurity threats. The documentation comprises the logbooks, penetration testing, training materials, and system configurations, among others, to show that the specified milestones were accomplished, and the project achieved its goals.
References Aminu, M., Akinsanya, A., Dako, D. A., & Oyedokun, O. (2024). Enhancing cyber threat detection through real-time threat intelligence and adaptive defence mechanisms. International Journal of Computer Applications Technology and Research, 13(8), 11-27. https://www.researchgate.net/profile/Ayokunle-Akinsanya/publication/382782321_Enhancing_Cyber_Threat_Detection_through_Real-time_Threat_Intelligence_and_Adaptive_Defense_Mechanisms/links/66abc9a12361f42f23abd2a1/Enhancing-Cyber-Threat-Detection-through-Real-time-Threat-Intelligence-and-Adaptive-Defense-Mechanisms.pdf Patel, A., & Chaudhary, M. (2024). Zero Trust Architecture: A Comprehensive Guide to Modern IT Security. Baltic Multidisciplinary Research Letters Journal, 1(3), 44–53. https://www.bmrlj.com/index.php/Baltic/article/view/24 Silic, M., & Lowry, P. B. (2020). Using design-science-based gamification to improve organizational security training and compliance. Journal of Management Information Systems, 37(1), 129–161. https://doi.org/10.1080/07421222.2019.1705512
image3.png
image1.png
image2.jpeg
,
Unit 7 Assignment 1
Unit 7 Assignment 1
Unit 7 IT595
Clifford Shells
Purdue University Global
IT595: Master’s Capstone in Cybersecurity Management
January 25, 2025
Milestone 3: Implementation and Testing – Status Report
Implementation and Testing were recognizable as the last step of the cybersecurity project at milestone 3, which executes the Zero Trust security model and evaluates the performance of the model. The second phase of the process was dedicated to more precise activities involved in tool implementation, including rolling out MFA and EDR solutions as native components of the systems employed. This also entailed the performance of the security evaluation known as the Penetration Test and the User Acceptance Test or UAT (Ali, Ullah, Islam, & Hossain, 2025).
Figure 1 Steps to Design a Zero Trust System (geeks for geeks, 2024)
Figure 2 Flow Diagram of Multifactor Authenticator Code (login radius, 2025)
This paper contains the stakeholders' recommendations, tasks accomplished, new WBS, and the experience gained while implementing the report's milestones.
Recommendations for Stakeholders
Based on this milestone, the following cybersecurity theories and frameworks are recommended for managing risks, threats, and vulnerabilities:
Zero Trust Model: People should use the never trust, always verify approach (Buck, Olenberger, Schweizer, Völter, & Eymann, 2021). This model removes the attack surface by continuously validating users, devices, and network activity at every organizational level. Micro-segmentation is used to restrict amounts of lateral mobility by segmenting the network into protection rings, while the integration of MFA guarantees strong authentication of users.
Defense-in-Depth Framework: Bi-security measures should remain a priority. EDR, firewalls, and encryption prevent ongoing attacks and minimize data leakage even if an attacker is already inside the network.
Continuous Monitoring and Threat Detection: To introduce real-time AI analytics for anomaly detection and menace prediction, it should be noted that.
Regular Penetration Testing: Penetration testing is conducted periodically to ensure that the security measures available and recently implemented have been assessed and revised.
Figure 3 Penetration Testing Flow Chart
Tasks Completed
During this milestone, the following tasks were conducted:
1. Tool Deployment:
Implemented MFA and set up authentication effects to heighten user identification—Consolidated capable EDR products for endpoint detection and quick threat reaction.
2. Penetration Testing:
Various forms of penetration testing are used to discover weaknesses that an adversary may notice in the system. There were documented vulnerabilities, applied patches were made, and re-secured to attest compliance.
3. User Acceptance Testing (UAT):
Users were interviewed to discover problems with the interface and its functions. Several comments from advanced users were assembled, and changes were integrated to enhance general usability for all.
4. Documentation and Reporting:
Designed elaborate configurations for the systems and records of tests and feedback. Revised the WBS to incorporate actual time and variations from the baseline schedule.
Updated Work Breakdown Structure (WBS)
Table 1 Work Breakdown Structure (WBS)
Task |
Planned Duration (days) |
Actual Duration (days) |
Notes |
MFA Deployment |
3 |
4 |
Additional day for fine-tuning. |
EDR Configuration |
4 |
4 |
Completed as scheduled. |
Penetration Testing |
5 |
6 |
Required more retesting cycles. |
User Acceptance Testing |
3 |
4 |
Additional day for stakeholder input. |
Final Documentation |
2 |
Collepals.com Plagiarism Free Papers Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers. Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS Why Hire Collepals.com writers to do your paper? Quality- We are experienced and have access to ample research materials. We write plagiarism Free Content Confidential- We never share or sell your personal information to third parties. Support-Chat with us today! We are always waiting to answer all your questions. ![]() All Rights Reserved Terms and Conditions |