logo

Cyber-security Program

   

Added on  2022-11-28

5 Pages914 Words463 Views
Running head: CYBER-SECURITY PROGRAM
Cyber-security Program
Name of the Student:
Name of the University:
Author Note:

CYBERSECURITY PROGRAM1
4.1: Develop cyber-security program aligned with business needs, regulations, and
compliance standards to enhance an organization's security posture.
No single tactics or strategy can guarantee the success of a security program aligned
with the business goals, regulations and compliance. Hence, to enhance the security of the
organization, the cyber-security program needs to be regularly updated (Cherdantseva et al.,
2016). However, the organization can shed light upon three domains to improve the cyber-
security program aligned with the business needs.
Business functions: These are normal operations or functions that are being carried by the
employees of an organization. These include purchasing, marketing, R&D, HR, sales,
manufacturing. The ABC software Inc. need to implement such security controls to protect
the business functions mentioned above. The security control should include governance,
planning and management.
IT assets: IT assets includes all the hardware and software that the company use to perform
daily activities such as routers, mobile devices, computers, servers. Security of these items is
the utmost priority for the company.
Data: Like other organization, ABC software also has a large amount of data to store and
protect (Cherdantseva et al., 2016). These data includes employee’s personal details, login
credentials and other sensitive information. The security program should be able to protect
everything inside the organization.
4.2: Determine appropriate business strategies to ensure business sustainability,
availability, and reliability and articulate these needs to relevant stakeholders.
The customers of this decade are educated and with high moral values. They only
chose businesses that share the same moral values as them. The organizations need to have an

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Importance of Cybersecurity
|3
|501
|340

PfSense: A Comprehensive Cybersecurity Tool for Intrusion Detection System
|20
|3463
|311

Cybersecurity Framework Compliance and Risk Assessment
|6
|610
|343

Cyber Security Assignment 2022
|13
|965
|14

Cyber Security Assessment 2022
|12
|2742
|20

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375