Learning Goal: I’m working on a cyber security project and need support to help me learn.Wonderful news. The executive team of your media company has recognized the importance of cybersecurity and has promoted everyone in your group into the role of a chief information security officer, or CISO, for your respective subsidiary.The company’s executive leadership team has tasked your team to plan the future of mass connectivity and data loss prevention technology for the company. You and your teammates will compile a technology strategy plan for incorporating IPv6, internet of things (IoT), and data loss prevention techniques—specifically blockchain, tokenization, data masking, data obfuscation, and other similar emerging technologies.You will present this future technology road map and vision to the executive leadership. Your team will have about five members. In addition to the future technology road map and vision, your team will prepare a future view of the data flow of your enterprise network..The world of technology is changing at an unprecedented pace, and these changes represent business opportunities as well as challenges. Mass connectivity and faster speeds create opportunities for businesses to network more devices, complete more transactions, and enhance transaction quality. Internet Protocol version 6 (IPv6) and internet of things (IoT) are two such technologies that represent significant opportunities for strategic cybersecurity technology professionals to create lasting value for their organizations.IoT is the phenomenon of connecting devices used in everyday life. It provides an interactive environment of human users and a myriad of devices in a global information highway, always on and always able to provide information. IoT connections happen among many types of devices—sensors, embedded technologies, machines, appliances, smartphones—all connected through wired and wireless networks.Cloud architectures such as software as a service have further enabled big data analytics and improvement in areas such as automated manufacturing. Data and real-time analytics are now available to workers through wearables and mobile devices.Such pervasive proliferation of IoT devices gives hackers avenues to gain access to personal data and financial information and increases the complexity of data protection. Given the increased risks of data breaches, newer techniques in data loss prevention should be examined.Increased bandwidth and increased levels of interconnectivity have allowed data to become dispersed, creating issues for big data integrity. In such a world, even the financial transactions of the future are likely to be different—digital currencies such as Bitcoin may be used for some future financial transactions.To survive and thrive, organizational technology strategists must develop appropriate technology road maps. These strategists must consider appropriate function, protection, and tamper-proofing of these new communications and transactions.It will be impossible to protect data by merely concentrating on protecting repositories such as networks or endpoints. Cybersecurity strategists have to concentrate on protecting the data themselves. They will need to ensure that the data are protected no matter where they reside.In this project, you will work with team members to compile a technology strategy plan for your organization to protect data throughout the company. A Cybersecurity Technology Strategic Plan, about 4-5 double-spaced pages in a Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list in your plan.
A set of about five to 4-5 narrated PowerPoint slides (written narration or in-class presentation can be substituted for audio/video narration) as an executive overview briefing that reflects the key elements of your team plan.
Step 2: Select Devices and Technologies
Step 3: Develop Goals and Objectives
Step 2: Select Devices and TechnologiesBy now, you have an idea of your team members and your role on the team project. Now, it’s time to get the details about the devices and technologies needed to be included in the Strategic Technology Plan for Data Loss Prevention.You should limit the scope of this project by selecting a set of devices and technologies that are most appropriate for data loss prevention for your business mission and future success. Based on your prior knowledge of your company and based on the project roles you agreed upon in the previous step, perform independent research on the following topics and identify a set of devices and technologies that you propose for your company, and your business rationale for selecting them:IPv6
internet of things (IoT)
data loss prevention that covers:
data loss prevention
big data analytics
big data integrity
data obfuscation
data masking
operational context/context-aware security
data tokenization
data governance
Your team plan should include significant detail about these technologies, including what kinds of IoT devices will be appropriate for the company’s use. During your research, you should also see if there might be any issues for integration and implementation, which you will consider in greater detail in a later step in the project.When you’ve finished detailing the proposed devices and technologies, move to the next step, where the team will outline its goals on how the devices and technologies will ensure the company is prepared for future vulnerabilities.Step 3: Develop Goals and ObjectivesYou and your team members have outlined the proposed devices and technologies for the data loss prevention plan. Next, focus on the organizational mission and develop a set of goals and objectives to show how your set of chosen devices and technologies will help your company prepare for the future. Include a discussion for deploying, maintaining, and securing these devices and technologies.This section of the team plan should also include a discussion on the devices and technologies’ impact to the existing company infrastructure and security.When you’ve completed this section, move to the next step, where you and your team members will conduct a detailed analysis of each device and technology.