Addressing security breaches in a retail company IT department: You have been re
ID: 3662967 • Letter: A
Question
Addressing security breaches in a retail company IT department:
You have been recently appointed as the Chief Security Officer for a large retail company. Your boss believes that, in a cloudy, mobile and high speed information consumption driven world, traditional network boundaries are blurred and the perimeter based security approaches are no longer effective. The threat is enhanced by the sophisticated analytics capabilities the hackers are starting use to snoop. She has asked you to come up with a new approach that uses an intelligence-driven security model, which relies on security information in real-time from both internal and external sources to construct a realistic risk and vulnerability.
1.A paper which must contain following:
#Executive summary
#Problem statement
#Key requirements to address the problem
#Key research findings
#Solution options/conclusion/recommendations
Explanation / Answer
Executive summary:
"chief security officer" (CSO) means is highest-level executive directly responsible for the organization's the entire security function.
Not only responsible for their an organization's . and also responsible for physical security and electronic or digital security and computer networks.
The job of chief security officer (CSO) is work with other executive and decide on the priority of security needs.
The chief security officer (CSO) also oversee the network of the security directors and managers,staff.
chief security officer (CSO) role is within organization to help strong and secure connection between departments.
chief security officer (CSO) information security type he/she responsible for protecting company and information of employees from unauthorized access or unauthorized persons.
Problem Statement:
In this world technology developed rapidly so the chief security officer (CSO) provide security physical,digital or electronic and management planning.
he/she analytics capabilities of the hackers information
Key requirements to address the problem:
1.The practice of the cyber security should focus on the instructions and the compromise do not result the business loss.
2.Every Organizations Needs to shift more security resources for threat detection,remediation.
3.To improve threat detection it requires intelligence-drivensecurity approach.This approach helps the to provide security both internal and external.
find hidden threats also.
4.Technology automation it helps the analysts make most of the time by slashing the workload so different types of risk affected the organization.
5.Every organization each and every employee need to educate security policy and risks.
6.Maintain the data flexible architecture.
7.Observere every employees which type of information they sent and they took any important information about company by sending mails or copy by using pendrives or CDS
or mobile devices.
8.when we more data to provide more security.
9.Dont share login user name and passwords to other employees.
10.Identity and access management (IAM).
Key research findings:
1.SOC (Security Operations centers)
Scalable analytics engines
Consolidated warehouse for security data
Centralized management dashboard
Flexible data architecture
Automated data normalization
Pattern-based monitoring techniques
Rich correlation of incident information
Full network packet capture
External threat intelligence services
Active countermeasures and controls
Integrated compliance management process
2. Big Data Fuels Intelligence-Driven Security.
Diverse data sources
Automated tools
Analytics engines
Advanced monitoring systems
Active controls
Centralized warehouse
Standardized views
N-tier infrastructures
High degree of integration
Solution options/conclusion/recommendations:
For the best results follow the security operations and many leading organizations can achieve the result such as reduce the average time for resolving threats by up to 60 percent.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.