0% found this document useful (0 votes)
304 views

Csol 580 Week 7

The document proposes a cyber threat intelligence plan for a company. It recommends implementing a network monitoring solution, performing audits and penetration testing, providing employee training, and updating policies and procedures. This would help the company identify vulnerabilities and mitigate cyber threats. The plan estimates it would take days to weeks to implement recommendations like network monitoring or penetration testing, and have costs ranging from $4,000 per month for monitoring to $20,000 for penetration testing of 300 IP addresses. The document argues these investments would help avoid serious financial and legal consequences of cyber incidents.

Uploaded by

api-487513274
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
304 views

Csol 580 Week 7

The document proposes a cyber threat intelligence plan for a company. It recommends implementing a network monitoring solution, performing audits and penetration testing, providing employee training, and updating policies and procedures. This would help the company identify vulnerabilities and mitigate cyber threats. The plan estimates it would take days to weeks to implement recommendations like network monitoring or penetration testing, and have costs ranging from $4,000 per month for monitoring to $20,000 for penetration testing of 300 IP addresses. The document argues these investments would help avoid serious financial and legal consequences of cyber incidents.

Uploaded by

api-487513274
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Running Head: CYBER THREAT INTELLIGENCE PLAN 1

Cyber Threat Intelligence Plan

University of San Diego

March 11, 2019


CYBER THREAT INTELLIGENCE PLAN 2

Executive Summary

Our organization faces a wide array of cyber threats on a daily basis. A single

incident can have serious financial, reputational, and regulatory consequences so it is in

the companies’ best interests that we are well postured to mitigate these threats.

Establishing a sound cybersecurity program inclusive of policies, operations, and testing

is crucial to our organization. Even more, maintaining the program and holding our

company and its employees to that standard will be an even bigger challenge.

A big consideration about cyber security and threat mitigation is that applied tools

and techniques are not a “one and done” tool. The company will have to be steadfast in

maintaining all of the equipment, performing periodic assessments, and performing

necessary maintenance and upgrades in order for the company to stand the best chance of

not being subjected to an incident. Another consideration is that as an Internet Service

Provider, our company not only has our own resources to protect. We are responsible to

our company, its resources, its employees, as well as its customers. In the world of cyber

security, a smaller investment up front does not immediately present a return on

investment (ROI), but is recognized by the lack of incidents that would ultimately cost

this organization more than it invested.

This proposal will serve as a recommendation to the senior leadership of our

organization on what steps or actions we should take in order to decrease our exposure to

cyber threats while inheriting an acceptable level of risk. The common phase “you get

what you paid for” is very applicable in the world of cyber security and threat mitigation.

There are no shortcuts to good security, so our security and the defense of our assets is

only as good as we make it.


CYBER THREAT INTELLIGENCE PLAN 3

Cyber Threat Intelligence Plan

Our company faces the potential exposure to cyber threats constantly. To ensure

that the company has the highest probability of avoiding cyber incidents, this intelligence

plan will present historical examples of cyber incidents, the induced ramifications, as

well as propose some steps that senior leadership can take to better posture our company

against these threats.

A History of Cyber Attacks

Many companies have been exposed to high visibility attacks. Private sector

organizations such as Home Depot, Target, Costco, Heartland Payment Systems, and

Sony have all been breached resulting in significant damages to the organizations. To

add to that, the United States Federal Government has also seen its share of breaches

including the Office of Personnel Management breach that exposed Personal Identifiable

Information of millions of federal employees.

There have been well-known and well-documented malware attacks that have

affected millions of users worldwide. Attacks can originate from various threat actors, or

those who initiate their attacks with certain intentions in mind.

Image 1. The Various Threat Actors and Their Intentions (Trend Micro, 2015).
CYBER THREAT INTELLIGENCE PLAN 4

Vulnerabilities to software applications, malware, phishing, and other attack vectors have

been employed. Unpatched software applications such as the Microsoft SMB

vulnerability resulted in the Equifax data breach in 2017 as well as the WannaCry and

NotPetya ransomware attacks of 2017. Other security vulnerabilities with these attacks

included exposed developer credentials, domain controller problems, and even infected

updates for M.E.Doc software that was involved in the NotPetya ransomware breach.

Image 2. Top 5 Common Cyber Threats (Cybriant, n.d.).

The briefly illustrated history of attacks and attack vectors utilized brings to light that our

company should take proactive measures on identifying threats and vulnerabilities,

improving our cyber security, and ultimately mitigating the widest range of threats

feasibly possible.

The Plan

This briefing and associated presentation will serve as a recommendation to

senior leadership regarding what steps and actions we can take in order to evaluate and

improve upon our cyber security posture. The following actions are highly recommended

for the organization to improve the current cyber security posture:


CYBER THREAT INTELLIGENCE PLAN 5

 Implement network monitoring solutions: These software solutions, such as Logic

Monitor, enable companies to monitor the security and performance of the

enterprise network. This includes resource use and management, testing, data

logging, and security monitoring and alerting.

 Perform audits: Assessing compliance with standing policies can reveal potential

security shortcomings. Company policies such as Acceptable Use, Bring-Your-

Own-Device (BYOD), and Teleworking are some of the few policies our

company has in place. Ensuring full compliance by employees of these policies

can help in mitigating accidental internal threats.

 Employee training: Performance trends from network monitoring and audits

verifying compliance can reveal shortcomings in employee awareness and

knowledge when using the corporate network. Sufficient training should be

provided to employees to help reduce exposure to threats, such as training about

phishing threats in emails or social engineering attacks.

 Perform penetration testing: This type of testing can be performed internally or

externally, but due to the nature and size of our company it is recommended to

have a third party perform the testing. This test will assess our entire cyber

security posture and reveal security vulnerabilities ranging from expired to

credentials to missing patches to improperly configured networking equipment.

 Consider farming out certain functions and operations: The cost, either monetary

or resources, of obtaining and maintaining operations can become excessive.

There are third party firms that can offer a wide array of cyber security services,
CYBER THREAT INTELLIGENCE PLAN 6

such as Solar Winds or Logic Monitor, who provide network monitoring as a

Software-as-a-Service (SaaS).

 Update policies and procedures: Any identified problems and lessons learned

from penetration testing should be incorporated to existing policies.

Incorporating audits into the policies should ensure that the company remains in

compliance with established documentation.

Timeline and Costs

This section will briefly cover approximate time requirements and costs

associated with the recommended upgrades.

 Network monitoring solution: This requirement, depending on deployment

structure, could be deployable within days to weeks. If network monitoring is

handled within the organization, the time required to procure, test, and implement

the solution must be considered as well as employee training to operate and

maintain the solution. The more feasible option would be to farm this function

out to a third party vendor. Logic Monitor offers this solution as a SaaS service,

requiring very little time and resources from the company and is scalable to our

architecture. Pricing for enterprise level protection starts at $4000 per month for

200 devices at a rate of $20 per device (Logic Monitor, n.d.).

 Penetration testing: This service can take several days to a couple weeks

depending on the vendor or depth of testing performed. As a baseline, TrustNet

offers penetration testing services based on the number of IP’s with one package

starting at $20,000 for 300 IP’s (TrustNet, n.d.).


CYBER THREAT INTELLIGENCE PLAN 7

 Training, audits and policies: These processes can take days to weeks to perform

and could cost the company little in monetary value. What would be experienced

is reduced time from employees working in order to attend training. Audits can

be performed during penetration testing and policies can be updated afterwards.

Conclusion

The company can benefit from implementing these proposals in a great manner.

These steps can identify vulnerabilities within the organization ranging from personnel

concerns, physical or network security, and can give the company the insight and

information required to mitigate such vulnerabilities and avoid serious financial and legal

ramifications later down the road. This briefing recommends these various steps, but

senior leadership should also take into consideration the benefits versus costs and decide

if the Return on Investment is deemed worthwhile.


CYBER THREAT INTELLIGENCE PLAN 8

References

Cybriant. (n.d.). Top 5 Cyber Threats. Retrieved fro https://www.cybriant.com

Fleishman, G. (2018). Equifax Data Breach, One Year Later: Obvious Errors and No

Real Changes, New Report Says. Retrieved from

http://fortune.com/2018/09/07/equifax-data-breach-one-year-anniversary/

Logic Monitor. (n.d.). Pricing. Retrieved from https://www.logicmonitor.com/pricing/

Symantec. (2017). Ransom.Wannacry. Retrieved from

https://www.symantec.com/security-center/writeup/2017-051310-3522-99

Trend Micro. Targeted Attack Campaigns and Trends: 2014 Annual Report. Retrieved

from https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/targeted-

attack-campaigns-and-trends-2014-annual-report

TrustNet. (n.d.). Penetration Testing Cost. Retrieved from

https://www.trustnetinc.com/pricing/penetration-testing/

You might also like