Northcentral University TIM-8301: PwC Cybersecurity Strategic Plan

Verified

Added on  2022/09/10

|22
|1041
|22
Project
AI Summary
This project presents a cybersecurity plan tailored for PricewaterhouseCoopers (PwC), a multinational professional services network. The plan outlines a strategic approach to address current and future cybersecurity needs, emphasizing an integrated strategy that considers changes in information assets, threats, and vulnerabilities over a five-year period. It covers key components such as strategy and transformation, privacy and data protection, implementation and operation, and incident and threat management. The plan incorporates capabilities for high resilience, including detailed mapping of business procedures, real-time monitoring, and development of privacy policies. It addresses threats to information security, including data backup strategies and top-level cybersecurity measures. The plan also details action items for network security, email security, and employee training, ensuring a comprehensive approach to cyber resilience. The conclusion highlights the importance of cybersecurity for protecting sensitive information and maintaining business integrity, supported by references to relevant research and industry best practices.
Document Page
P R I N C I P L E S O F C Y B E R
S E C U R I T Y
N A M E O F T H E S T U D E N T
N A M E O F T H E U N I V E R S I T Y
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
OBJECTIVE:
The main purpose of this PPT is to make a cyber security
plan for the company, PricewaterhouseCoopers.
The cyber security, can provide assurance and clarify
about cyber security as well as it enables the
information technology to communicate effectively.
The PricewaterhouseCoopers International Limited also
known as PWC, is basically a multinational professional
service network.
Document Page
CYBER SECURITY:
The cyber security plan is basically
an essential tool that is for any of the
organisation which is seeking for
protection the consumers, corporate
related information and employees.
By defining the present and future
state states of the landscape of the
cyber security, this can provide
assurance and clarify about cyber
security as well as most importantly
it enables the information technology
to effectively communicate.
Document Page
BACKGROUND OF THE
COMPANY:
The PricewaterhouseCoopers International Limited
also known as PWC, is basically a multinational
professional service network.
The headquarter is in London, UK.
PwC is ranking as the 2nd largest professional
services organisation in all over the world.
The company is a network of organisations in
Countries, 250930 people, 721 locations.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BLUEPRINT FOR CYBERSECURITY
SUCCESS:
Document Page
COMPONENTS TO PROPEL
TRANSFORMATION AND ACHIEVE
GROWTH:
There are four components for propelling
transformation and achieve growth. They are as
follows:
Strategy and Transformation
Privacy and Data Protection
Implementation and Operation
Incident and Threat Management.
Document Page
CAPABILITIES:
The companies that are having high resilience
and quotient data, the companies need to
develop the below capabilities:
A map in detail for the business procedures
and IT assets.
A reality checking definition of the cyber
attacks that can be survived.
A monitoring system that will monitor real
time data which can measure the health of the
operations.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DEVELOPMENT OF PRIVACY
POLICY:
The privacy is very much important for the customers
and business. The continued trust in the business
practices, secure handling of the customers and
products unique information will impact to the
profitability.
The customers ‘ information need to be kept secure.
Like the payment information such as debit card or
credit card numbers, verification codes, email
addresses, shipping and billing addresses,
purchasing history, phone numbers etc.
Document Page
THREATS TO INFORMATION
SECURITY:
Document Page
CREATE SECURITY LAYERS:
Protecting data such as challenge to the security is all
about creating protection layers. When the matter is of
data security, there are several things to consider such
as:
Inventory of the data
Identify and protect the valuable and sensitive data
Control access to the data
Secure the data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CHALLENGES AND GOALS FOR
CYBERSECURITY:
Document Page
DATA BACK UP:
The company need to keep a back up of all of their
sensitive information and data. If in the event, the
data will be stolen by the hackers or thieves or
even deleted by an employee accidentally.
However, the company needs to keep in mind that
the physical media like drive or disc that is used
for storing the data back up which is vulnerable.
So, the company need to keep the drive encrypted.
Document Page
TOP LEVEL CYBER SECURITY
STRATEGY:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER PLAN ACTION ITEMS:
Train the employees for recognizing the
social engineering.
Protection against the online fraud.
Protection against phishing.
Protection against malware.
Be aware of adware and spyware.
Document Page
CYBER PLAN FOR NETWORK
SECURITY:
Secure the cloud services and internal network.
Develop policies for strong password.
Encrypt and Secure the company’s Wi-Fi.
Encrypt the sensitive data of the company.
Set rules for safe web browsing.
Create Policy for Safe-Use Flash Drive.
Document Page
CYBER RESILIENCE FOR WEB
SECURITY:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER PLAN ACTION ITEMS
FOR EMAIL:
Set up a filter spam email
Train the employees in responsible usage of email
Protect sensitive information that have been sent
via email
Set a sensible retention policy for email
Develop an usage policy for email
Document Page
CYBER PLAN ACTION ITEMS FOR
EMPLOYEES:
Develop a hiring process which vets properly
candidates.
Perform credentialing and background checks
Take care of dealing with the third parties
Set access controls that will be appropriate for
employees
Provide security related training to the employees.
Document Page
CYBER SECURITY PLAN:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CONCLUSION:
Thus, it can be concluded that the cyber security plan is
very much important for the businesses. The information
of clients and customers, information of payments,
details of bank accounts, - all of these information are
next to impossible as those cannot be replaced.
The cyber security plan is very much essential for any of
the organizations who are seeking to protect the
consumers, corporate information and employee related
information.
Document Page
REFERENCES:
Fernandez, A., & Stol, N. (2017). Economic, dissatisfaction, and reputation risks of
hardware and software failures in PONs. IEEE/ACM Transactions on Networking
(TON), 25(2), 1119-1132.
Gallo, L., Botta, A., & Ventre, G. (2019, December). Identifying threats in a large company's
inbox. In Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning
and Artificial Intelligence for Data Communication Networks (pp. 1-7). ACM.
Oliva, F. L. (2016). A maturity model for enterprise risk management. International Journal
of Production Economics, 173, 66-79.
Pan, Y. (2016). Heading toward artificial intelligence 2.0. Engineering, 2(4), 409-413.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines
for effective information security management. Auerbach Publications.
Rotella, P. (2018, May). Software security vulnerabilities: baselining and benchmarking.
In 2018 IEEE/ACM 1st International Workshop on Security Awareness from Design to
Deployment (SEAD) (pp. 3-10). IEEE.
Document Page
chevron_up_icon
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]