Csol 580 Week 7
Csol 580 Week 7
Executive Summary
Our organization faces a wide array of cyber threats on a daily basis. A single
the companies’ best interests that we are well postured to mitigate these threats.
is crucial to our organization. Even more, maintaining the program and holding our
company and its employees to that standard will be an even bigger challenge.
A big consideration about cyber security and threat mitigation is that applied tools
and techniques are not a “one and done” tool. The company will have to be steadfast in
necessary maintenance and upgrades in order for the company to stand the best chance of
Provider, our company not only has our own resources to protect. We are responsible to
our company, its resources, its employees, as well as its customers. In the world of cyber
investment (ROI), but is recognized by the lack of incidents that would ultimately cost
organization on what steps or actions we should take in order to decrease our exposure to
cyber threats while inheriting an acceptable level of risk. The common phase “you get
what you paid for” is very applicable in the world of cyber security and threat mitigation.
There are no shortcuts to good security, so our security and the defense of our assets is
Our company faces the potential exposure to cyber threats constantly. To ensure
that the company has the highest probability of avoiding cyber incidents, this intelligence
plan will present historical examples of cyber incidents, the induced ramifications, as
well as propose some steps that senior leadership can take to better posture our company
Many companies have been exposed to high visibility attacks. Private sector
organizations such as Home Depot, Target, Costco, Heartland Payment Systems, and
Sony have all been breached resulting in significant damages to the organizations. To
add to that, the United States Federal Government has also seen its share of breaches
including the Office of Personnel Management breach that exposed Personal Identifiable
There have been well-known and well-documented malware attacks that have
affected millions of users worldwide. Attacks can originate from various threat actors, or
Image 1. The Various Threat Actors and Their Intentions (Trend Micro, 2015).
CYBER THREAT INTELLIGENCE PLAN 4
Vulnerabilities to software applications, malware, phishing, and other attack vectors have
vulnerability resulted in the Equifax data breach in 2017 as well as the WannaCry and
NotPetya ransomware attacks of 2017. Other security vulnerabilities with these attacks
included exposed developer credentials, domain controller problems, and even infected
updates for M.E.Doc software that was involved in the NotPetya ransomware breach.
The briefly illustrated history of attacks and attack vectors utilized brings to light that our
improving our cyber security, and ultimately mitigating the widest range of threats
feasibly possible.
The Plan
senior leadership regarding what steps and actions we can take in order to evaluate and
improve upon our cyber security posture. The following actions are highly recommended
enterprise network. This includes resource use and management, testing, data
Perform audits: Assessing compliance with standing policies can reveal potential
Own-Device (BYOD), and Teleworking are some of the few policies our
externally, but due to the nature and size of our company it is recommended to
have a third party perform the testing. This test will assess our entire cyber
Consider farming out certain functions and operations: The cost, either monetary
There are third party firms that can offer a wide array of cyber security services,
CYBER THREAT INTELLIGENCE PLAN 6
Software-as-a-Service (SaaS).
Update policies and procedures: Any identified problems and lessons learned
Incorporating audits into the policies should ensure that the company remains in
This section will briefly cover approximate time requirements and costs
handled within the organization, the time required to procure, test, and implement
maintain the solution. The more feasible option would be to farm this function
out to a third party vendor. Logic Monitor offers this solution as a SaaS service,
requiring very little time and resources from the company and is scalable to our
architecture. Pricing for enterprise level protection starts at $4000 per month for
Penetration testing: This service can take several days to a couple weeks
offers penetration testing services based on the number of IP’s with one package
Training, audits and policies: These processes can take days to weeks to perform
and could cost the company little in monetary value. What would be experienced
is reduced time from employees working in order to attend training. Audits can
Conclusion
The company can benefit from implementing these proposals in a great manner.
These steps can identify vulnerabilities within the organization ranging from personnel
concerns, physical or network security, and can give the company the insight and
information required to mitigate such vulnerabilities and avoid serious financial and legal
ramifications later down the road. This briefing recommends these various steps, but
senior leadership should also take into consideration the benefits versus costs and decide
References
Fleishman, G. (2018). Equifax Data Breach, One Year Later: Obvious Errors and No
http://fortune.com/2018/09/07/equifax-data-breach-one-year-anniversary/
https://www.symantec.com/security-center/writeup/2017-051310-3522-99
Trend Micro. Targeted Attack Campaigns and Trends: 2014 Annual Report. Retrieved
from https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/targeted-
attack-campaigns-and-trends-2014-annual-report
https://www.trustnetinc.com/pricing/penetration-testing/