logo

Cyber and Digital Risk

   

Added on  2022-12-23

11 Pages3145 Words1 Views
 | 
 | 
 | 
Running head: CYBER AND DIGITAL RISK
Cyber and Digital Risk
Young Acorn Foundation (ACORN)
Name of the student:
Name of the university:
Author Note
Cyber and Digital Risk_1

CYBER AND DIGITAL RISK
1
Executive Briefing on Cyber and Digital Risk as an Executive/Board-level
Responsibility
Purpose:
ACORN or The Young Acorn Foundation is a leading NFP or two-2-not-for-profit business.
Their mission and vision include the promotion of a sustainable society. Here, all the child must be
getting the scope to possess a fair go on life. This would help them to develop as a young adult. The
situation would help them to acquire dignity and achieve enough skills in enriching the community
as well as individual personality. One important aspect of the IS/IT that all the people in the nation
have been actually proud of the current establishment of their data center. It is situated as the east
wing of its headquarter. This is expected to be used extensively for supporting and driving numerous
aspects of their programs and operations. Moreover, they have the constant redundant facility of
backup that is connected to the external having the broadband connections of high speed. Besides,
they are intended to consist of the integrated facility of voice-video-data telecommunication along
with the technology of RAID storage and removable HDD. In this briefing report the cyber and
Digital Risk as an Executive or board-level liability is demonstrated.
Target audience:
Here, the target audience of the Senior Executive Team of Acorn.
Concerns with Cyber and Digital Risk:
Cybersecurity is one of the rapidly evolving and complex concerns that ACORN should be
contending with. It is witnessed that with the rise of social media, cloud computing and mobile
technology, a different type of reports towards important breaches of the proprietary data and ham to
the organizational IT infrastructure is rousingly common. In this way it has been changing the risk of
Cyber and Digital Risk_2

CYBER AND DIGITAL RISK
2
IT landscape at quick speed. As a result the cybersecurity has been regarded as great priority on
various board’s agendas along with its audit committees (Agustina 2015). Further, organized crimes
have been monetizing the cyberspace. It has exploited the vulnerabilities in the systems for
compromising and remotely maintain the computers. They have been found to be recording the
keystrokes, controlling the screen displays and found to be manipulating the users' computers to
divulging the sensitive data. Being borderless, the cyberspace has been permitting the attackers in
routing the assaults with the help of numerous jurisdictions and countries. This has included law
enforcement and complicated investigation (Shin, Son and Heo 2017). Further, ACORN has been
running the risks to lose substantial quantities of sensitive company data to malicious staffs. One can
also be potentially eradicating to the business premises and introducing the malicious software to the
corrupt the company databases along with sabotage network operations. Moreover, the corporate
espionage by ACORN has been commonplace in the field of cyberspace. It is seen that the attacks
are the target of intellectual property that is sensitive in nature (Tonn et al. 2019). Multiple instances
have been there of important firms having the security features getting compromised over for many
months. They have lost substantial quantity of sensitive information while those attacks go on. This
involves the loss of substantial quantity of sensitive information while the attack goes on (Bridges et
al. 2015). Besides, activism has been prevalent within cyberspace having the denial-of-service
attacks and sabotages rising frequently progressing. Previously, they have been attributed to the
groups of hacktivist like anonymous and the rising attacks has been pointing to the official
motivations (Underwood and Ehrenreich 2017).
Discussion on Cyber and Digital Risks:
Board level Responsibilities:
The cyberspace has been revolutionizing the time s people work and live. The Internet has
more than three billion users has been powering the financial development, rising collaboration with
Cyber and Digital Risk_3

CYBER AND DIGITAL RISK
3
innovation along with giving rise to jobs. The protection of key responsibilities resources is of
complex importance to the competitiveness and sustainability of ACORN. The organizations require
to be on the front as per the cyber preparedness. Further, cybersecurity has been though as a crucial
issue of IT instead of any strategic issue of risk management (Choi, Scott and LeClair 2016).
ACORN must gain benefits from controlling the risks drawing on the support of senior management,
risk awareness culture, risk management processes and policies and analysis of risk against the
objectives (Ruan 2017). Here, many benefits have been there to adopt the approach of risk
management to protect the cyber world. These are mentioned hereafter.
Strategic benefits:
For ACORN, the corporate decision making is developed across with great visibility of
exposure of risk for major projects and individual activities around their overall business
(Shackelford 2016).
Financial Benefits:
This is provided through diminishing the losses and developed the potential of ‘value for money’
(Green 2016).
Operational Benefits:
ACORN must be getting prepared for the utmost eventualities and ensure enough number of
contingency plans (Sallam 2015).
Hence, a set of questions are developed for Senior Executive Team of Acorn that can assist
and provide support to the current discussions on strategic level risks. This is particularly to assure
that suitable cultures and safeguards are in place.
The key questions for boards and CEOs of Senior Executive Team of Acorn:
Cyber and Digital Risk_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity Business Plan for Desklib
|25
|4839
|272

Managing Cyber Security Threats and Non-Cyber Security Threats
|11
|3818
|103

Cyber Security and Phishing Attacks on Customers and Companies
|8
|1902
|456

Cybersecurity in Business
|15
|3052
|490

Cybersecurity Name of the Student
|10
|1746
|26

Importance of Cyber Security in Retail Industry
|21
|7572
|72