Review the risk section of the companys sec form ten-k

Assignment Help Computer Network Security
Reference no: EM131214234

Corporate Profile: Cybersecurity Risk Profile

For this paper, you will construct a cybersecurityrisk profile for the company that you wrote about in Part 1 of the Corporate Profile project. Your risk profile, which includes an Executive Summary, Risk Register, and Risk Mitigation Recommendations (Approach & Security Controls by family), will be developed from information provided by the company in its Form 10-K filing (Annual Report to Investors) retrieved from the U.S. Securities and Exchange Commission (SEC) Edgar database. You will also need to do additional research to identify security controls, products, and services which could be included in the company's risk response (actions it will take to manage cybersecurity related risk).

Research

1. Review the Risk section of the company's SEC Form 10-K. Develop a list of 5 or more specific cyberspace or cybersecurity related risks which the company included in its report to investors. Your list should include the source(s) of the risks and the potential impacts as identified by the company.

2. For each risk, identify the risk management or mitigation strategies which the company has implemented or plans to implement.

3. Next, use the control families listed in the NIST Special Publication 800-53 https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdfto identify general categories of controls which could be used or added to the company's risk management strategy for each risk in your list.

4. For each control family, develop a description of how the company should implement these controls ("implementation approach") as part of its risk management strategy.

Write

1. Develop a 2 to 3 pageExecutive Summaryfrom your Corporate Profile Part 1 (reuse and/or improve upon the business profile). Your Executive Summary should provide an overview of the company, summarize its business operations, and discuss the sources, potential impacts, and mitigation approach/strategy for cybersecurity related risks identified in the company's annual report.The Executive Summary should appear at the beginning of your submission file.

2. Copy the Risk Register &Security Control Recommendations table (see template at the end of this assignment) to the end of the file that contains your Executive Summary.

3. Using the information you collected during your research, complete the table. Make sure that you include a name and description for each risk. For the security controls, make sure that you include the family name and a description of how each recommended control should be implemented (implementation approach). Include the control family only. Do not include individual security controls from NIST SP 800-53.

YourRisk Profile is to be prepared using basic APA formatting (including title page and reference list) and submitted as an MS Word attachment to the Corporate Profile Part 2 entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples.Consult the grading rubric for specific content and formatting requirements for this assignment.

Note: for this assignment you will be preparing a very high level risk register. Preparing a fully developed risk register and risk profile is beyond the scope of this course.

Table 1. Risk Register &Risk Mitigation Approach with Recommended Security Controls

Risk Identifier

Description of the Risk &
Current Risk Management Strategy

Risk Mitigation Approach with
Recommended Security Controls (by NIST SP 800-53 family)

Sequence # or Brief title (<50 characters)

Must be from Form 10-K. Split complex risk statements into multiple individual risks.

Must list NIST Control Family (two character ID) as part of recommended mitigation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reference no: EM131214234

Questions Cloud

What are some questions that you might want to ask in return : A management application vendor boasts about the scale of its management system, claiming that it can support 10 million managed objects. What are some questions that you might want to ask in return
Find vector equations for the lines : Convert the vector equations from the previous question into their parametric and cartesian forms - Find vector equations for the lines:
Create outline of your new it security policies for rollinon : Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks. Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.
Identify chocoholic tour key market or customer segments : MKTG1053 Service Quality Group Assessment - INDUSTRY PROJECT. Chocoholic Tour's Market/Customer Analysis: What type of customers make up the market in which Chocoholic Tour operates?  Identify Chocoholic Tour's key market/customer segments
Review the risk section of the companys sec form ten-k : Review the Risk section of the company's SEC Form 10-K. Develop a list of 5 or more specific cyberspace or cybersecurity related risks which the company included in its report to investors.
Number of on-line purchases of footwear : Q1. An on-line retailing firm conducts a study into the number of on-line purchases of footwear made during all of last year. The study wants to determine the proportion of Australians over the age of 25 who purchase footwear on-line. The managi..
What programs exist that help prevent bullying : Are school counseling programs that prevent bullying effective in decreasing antisocial behavior? What programs exist that help prevent bullying? How effective are those programs? How can we use current research to come up with a new research que..
Symmetrically distributed around the mean : For questions A and B, express your answer in a number between 0 and 1 with four digits of precision (i.e. 25.01% is 0.2501). For question C, express your answer in two decimal places (e.g. 1.31)
Create new earbud headphones : A manufacturing firm has recently opened up a plant to create new earbud headphones. If the length of the cord is normally distributed with a mean of 80 cm and standard deviation of 1.1 cm, what is the probability that

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write vulnerabilities and methods of securing rpc

TCO C states "Given a computer network for data transmission, identify and analyze possibilities for loss or modification of data. Write down the vulnerabilities of RPC? What are the present methods of securing RPC?

  Explain access control methods and attacks

Explain access control methods and attacks

  Define end-user access controls

Use the Web to conduct research on User Domain Security Policy and Access Management. Write a report which describes and differentiates the following: End-User Access Controls, Administrator Access Controls

  Describe the merits and demerits of other uses of this

in recent years the fcc and other bodies around the world have been removing spectrum dedicated to analog tv

  How the information will be used for system requirements

How the information will be USED for system requirements - what are the key features of the organizational context of the project - why the project will be successful

  How can sender and receiver establish new shared secret key

Suppose that the sender and re­ ceiver have never met, but there exists a trusted third party that shares a secret key with the sender and also shares a (different) secret key with the receiver. How can the sender and receiver establish a new shar..

  Explain diffie-helman protocol for sending message

In Diffie-Helman protocol, the common modulus is selected as n = 19 and the generator g is chosen to be 2. Alice and Bob select numbers 6 and 10 privately.

  Determine with justification the equation of the curve

Determine with justification the equation of the curve and determine with justification all values oft for which there is no point (x, y) on the curve.

  Construct the routing tables at each of the nodes

Construct the routing tables at each of the five nodes - Write a function computeDijkstra(sourceID,C)' which takes as inputs the source node ID and the link cost matrix and returns the final best cost vector and the final predecessor vector.

  Develop detailed plan to approach and secure incident scene

Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

  Create a security policy for the company

Create a security policy for the following company explaining network security, physical security and access control systems:

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd