Northcentral University TIM-8301: PwC Cybersecurity Strategic Plan

Verified

Added on  2022/09/10

|22
|1041
|22
Project
AI Summary
This project presents a cybersecurity plan tailored for PricewaterhouseCoopers (PwC), a multinational professional services network. The plan outlines a strategic approach to address current and future cybersecurity needs, emphasizing an integrated strategy that considers changes in information assets, threats, and vulnerabilities over a five-year period. It covers key components such as strategy and transformation, privacy and data protection, implementation and operation, and incident and threat management. The plan incorporates capabilities for high resilience, including detailed mapping of business procedures, real-time monitoring, and development of privacy policies. It addresses threats to information security, including data backup strategies and top-level cybersecurity measures. The plan also details action items for network security, email security, and employee training, ensuring a comprehensive approach to cyber resilience. The conclusion highlights the importance of cybersecurity for protecting sensitive information and maintaining business integrity, supported by references to relevant research and industry best practices.
Document Page
P R I N C I P L E S O F C Y B E R
S E C U R I T Y
N A M E O F T H E S T U D E N T
N A M E O F T H E U N I V E R S I T Y
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
OBJECTIVE:
The main purpose of this PPT is to make a cyber security
plan for the company, PricewaterhouseCoopers.
The cyber security, can provide assurance and clarify
about cyber security as well as it enables the
information technology to communicate effectively.
The PricewaterhouseCoopers International Limited also
known as PWC, is basically a multinational professional
service network.
Document Page
CYBER SECURITY:
The cyber security plan is basically
an essential tool that is for any of the
organisation which is seeking for
protection the consumers, corporate
related information and employees.
By defining the present and future
state states of the landscape of the
cyber security, this can provide
assurance and clarify about cyber
security as well as most importantly
it enables the information technology
to effectively communicate.
Document Page
BACKGROUND OF THE
COMPANY:
The PricewaterhouseCoopers International Limited
also known as PWC, is basically a multinational
professional service network.
The headquarter is in London, UK.
PwC is ranking as the 2nd largest professional
services organisation in all over the world.
The company is a network of organisations in
Countries, 250930 people, 721 locations.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BLUEPRINT FOR CYBERSECURITY
SUCCESS:
Document Page
COMPONENTS TO PROPEL
TRANSFORMATION AND ACHIEVE
GROWTH:
There are four components for propelling
transformation and achieve growth. They are as
follows:
Strategy and Transformation
Privacy and Data Protection
Implementation and Operation
Incident and Threat Management.
Document Page
CAPABILITIES:
The companies that are having high resilience
and quotient data, the companies need to
develop the below capabilities:
A map in detail for the business procedures
and IT assets.
A reality checking definition of the cyber
attacks that can be survived.
A monitoring system that will monitor real
time data which can measure the health of the
operations.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DEVELOPMENT OF PRIVACY
POLICY:
The privacy is very much important for the customers
and business. The continued trust in the business
practices, secure handling of the customers and
products unique information will impact to the
profitability.
The customers ‘ information need to be kept secure.
Like the payment information such as debit card or
credit card numbers, verification codes, email
addresses, shipping and billing addresses,
purchasing history, phone numbers etc.
Document Page
THREATS TO INFORMATION
SECURITY:
Document Page
CREATE SECURITY LAYERS:
Protecting data such as challenge to the security is all
about creating protection layers. When the matter is of
data security, there are several things to consider such
as:
Inventory of the data
Identify and protect the valuable and sensitive data
Control access to the data
Secure the data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CHALLENGES AND GOALS FOR
CYBERSECURITY:
Document Page
DATA BACK UP:
The company need to keep a back up of all of their
sensitive information and data. If in the event, the
data will be stolen by the hackers or thieves or
even deleted by an employee accidentally.
However, the company needs to keep in mind that
the physical media like drive or disc that is used
for storing the data back up which is vulnerable.
So, the company need to keep the drive encrypted.
chevron_up_icon
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]