INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIII, Issue VII, July 2024
www.ijltemas.in Page 197
Cybersecurity Strategic Plan Part 2
Onyinyechukwu Ujah, Miriam Duru, Samuel Akinola
University of Dallas, United States
DOI: https://doi.org/10.51583/IJLTEMAS.2024.130724
Received: 09 August 2024; Accepted: 14 August 2024; Published: 21 August 2024
I. Summary of Key Elements from Part 1
In Part 1, several key elements were addressed to enhance the company's cybersecurity posture and align it with its business
objectives. The introductory letter outlined the company's recent assessment of cybersecurity policies and vulnerabilities,
emphasizing the need for a proactive cybersecurity approach to protect critical information assets. The significance of strong
cybersecurity measures in the face of evolving cyber threats was underscored, highlighting the potential catastrophic
implications of data breaches. The call to action for all stakeholders to embrace and drive best cybersecurity practices, in line
with industry frameworks like the NIST Framework, was also emphasized.
The business mission, vision, and values of Grayson Insurance were articulated to communicate the company's core identity
and goals from a business perspective. The mission statement emphasized the commitment to offering high-quality service to
clients at competitive rates while fostering a friendly and competitive workplace. The vision aimed to position Grayson
Insurance as the most empathetic and attentive insurance company, striving to improve skills, offer quality products, and
expand customer access. The values of trust, knowledge, connection, teamwork, respect, integrity and professionalism, fun &
humor, and commitment underscored the company's commitment to ethical conduct, continuous learning, customer-centric
approach, and teamwork.
The IT philosophy of Grayson Insurance outlined guiding principles and values influencing the company's approach to
information technology and cybersecurity. Embracing digital transformation, cybersecurity classification, risk management,
security controls, proactive cybersecurity, and business and IT alignment were highlighted as key focus areas. The adoption
of outsourcing for various IT services, implementation of data classification schemes, and deployment of technical solutions
like email filtering systems and encryption reflected the company's proactive stance towards cybersecurity.
The organizational structure of Grayson Insurance's security team was presented, emphasizing the strategic positioning of the
Chief Information Security Officer (CISO) and the delegation of responsibilities across various security roles. Justifications
for the organizational chart were provided, highlighting the need for efficient team alignment with the company's
cybersecurity requirements. Collaboration with internal and external partners was emphasized to optimize resources and
expertise in addressing cybersecurity challenges effectively.
Furthermore, the security mission, vision, and core values of Grayson Insurance were outlined to establish principles and
objectives for the organization's security practices. The mission emphasized continuous evolution of cybersecurity
capabilities to detect, prevent, and respond to cyber threats, while the vision aimed to position Grayson Insurance as a leader
in crafting and delivering strong cybersecurity practices. Core values of confidentiality, integrity, availability, and
accountability underscored the company's commitment to safeguarding assets, information, and people.
Lastly, the security issues and challenges faced by Grayson Insurance, including data privacy and compliance, cyber
insurance risks, phishing and social engineering, and supply chain security, were identified. Recommendations for addressing
these challenges included prioritizing awareness and training programs for employees, nurturing a security-first culture, and
considering the human factor in cybersecurity strategies. The importance of strong leadership in fostering a culture of
awareness and responsible technology use was emphasized to mitigate the risks associated with human error in cybersecurity.
II. Performance Measurement Metrics
Phishing Resilience Rate:
What: Phishing Resilience Rate is calculated as the number of successful phishing attempts divided by the total number of
phishing simulation emails sent.
Why: This metric helps assess the effectiveness of phishing awareness training and identifies areas for improvement in the
organization's defense against phishing attacks.
How: By tracking this metric over time, the security team can evaluate the success of training programs and implement
targeted measures to enhance employee awareness and response to phishing attempts.
Audience: The security team, HR department, and executive management are the primary audience for this metric.
Frequency: Data is collected and reported monthly to provide regular insights into the organization's phishing resilience.
Responsibility: The Security Awareness Coordinator oversees the collection, analysis, and reporting of this metric.