Cybersecurity Strategic Plan Part 2

Article Sidebar

Main Article Content

Onyinyechukwu Ujah
Miriam Duru
Samuel Akinola

In Part 1, several key elements were addressed to enhance the company's cybersecurity posture and align it with its business objectives. The introductory letter outlined the company's recent assessment of cybersecurity policies and vulnerabilities, emphasizing the need for a proactive cybersecurity approach to protect critical information assets. The significance of strong cybersecurity measures in the face of evolving cyber threats was underscored, highlighting the potential catastrophic implications of data breaches. The call to action for all stakeholders to embrace and drive best cybersecurity practices, in line with industry frameworks like the NIST Framework, was also emphasized.


The business mission, vision, and values of Grayson Insurance were articulated to communicate the company's core identity and goals from a business perspective. The mission statement emphasized the commitment to offering high-quality service to clients at competitive rates while fostering a friendly and competitive workplace. The vision aimed to position Grayson Insurance as the most empathetic and attentive insurance company, striving to improve skills, offer quality products, and expand customer access. The values of trust, knowledge, connection, teamwork, respect, integrity and professionalism, fun & humor, and commitment underscored the company's commitment to ethical conduct, continuous learning, customer-centric approach, and teamwork.


The IT philosophy of Grayson Insurance outlined guiding principles and values influencing the company's approach to information technology and cybersecurity. Embracing digital transformation, cybersecurity classification, risk management, security controls, proactive cybersecurity, and business and IT alignment were highlighted as key focus areas. The adoption of outsourcing for various IT services, implementation of data classification schemes, and deployment of technical solutions like email filtering systems and encryption reflected the company's proactive stance towards cybersecurity.


The organizational structure of Grayson Insurance's security team was presented, emphasizing the strategic positioning of the Chief Information Security Officer (CISO) and the delegation of responsibilities across various security roles. Justifications for the organizational chart were provided, highlighting the need for efficient team alignment with the company's cybersecurity requirements. Collaboration with internal and external partners was emphasized to optimize resources and expertise in addressing cybersecurity challenges effectively.


Furthermore, the security mission, vision, and core values of Grayson Insurance were outlined to establish principles and objectives for the organization's security practices. The mission emphasized continuous evolution of cybersecurity capabilities to detect, prevent, and respond to cyber threats, while the vision aimed to position Grayson Insurance as a leader in crafting and delivering strong cybersecurity practices. Core values of confidentiality, integrity, availability, and accountability underscored the company's commitment to safeguarding assets, information, and people.


Lastly, the security issues and challenges faced by Grayson Insurance, including data privacy and compliance, cyber insurance risks, phishing and social engineering, and supply chain security, were identified. Recommendations for addressing these challenges included prioritizing awareness and training programs for employees, nurturing a security-first culture, and considering the human factor in cybersecurity strategies. The importance of strong leadership in fostering a culture of awareness and responsible technology use was emphasized to mitigate the risks associated with human error in cybersecurity.

Cybersecurity Strategic Plan Part 2. (2024). International Journal of Latest Technology in Engineering Management & Applied Science, 13(7), 197-207. https://doi.org/10.51583/IJLTEMAS.2024.130724

Downloads

Downloads

Download data is not yet available.

References

Anderson, R., & Moore, T. (2020). The Economics of Information Security and Privacy. Springer.

Buchanan, B. (2017). The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations. Oxford Academic. DOI: https://doi.org/10.1093/acprof:oso/9780190665012.001.0001

Ciampa, M. (2017). Security Awareness: Applying Practical Security in Your World. Cengage Learning.

Gordon, S., Loeb, M. P., & Lucyshyn, W. (2015). Managing Cybersecurity Resources: A Cost-Benefit Analysis. McGraw-Hill Education.

Kizza, J. M. (2016). Ethical and Social Issues in the Information Age. Springer. DOI: https://doi.org/10.1007/978-3-319-70712-9

Schreider, T. (2018). Building an Effective Cybersecurity Program.

Touhill, G. J., & Tobin, C. D. (2018). Cybersecurity for Executives: A Practical Guide.

Whitman, M. E., & Mattord, H. J. (2019). Principles of Information Security. Cengage Learning.

Vacca, J. R. (2019). Cybersecurity and Applied Mathematics. CRC Press.

Buchanan, B. G., & Shortliffe, E. H. (1984). Rule-Based Expert Systems: The MYCIN Experiments of the Stanford Heuristic Programming Project. Addison-Wesley.

Lippmann, R. P., Fried, D. J., Graf, I., Haines, J. W., Kendall, K., McClung, D., ... & Webster, S. E. (1997). Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks. DARPA Information Survivability Conference and Exposition.

Debar, H., Dacier, M., & Wespi, A. (1999). Towards a taxonomy of intrusion-detection systems. Computer Networks, 31(8), 805-822. DOI: https://doi.org/10.1016/S1389-1286(98)00017-6

Lee, W., & Stolfo, S. J. (2000). A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3(4), 227-261. DOI: https://doi.org/10.1145/382912.382914

Somayaji, A., & Forrest, S. (1997). Automated response using system-call delays. In Proceedings of the 14th national conference on Artificial Intelligence-Volume 2 (pp. 995-1002). AAAI Press.

National Institute of Standards and Technology (NIST). (2020). Computer Security Resource Center (CSRC). Retrieved from https://csrc.nist.gov/.

SANS Institute. (2021). Information Security Resources. Retrieved from https://www.sans.org/information-security/.

The Center for Internet Security (CIS). (2020). CIS Critical Security Controls: Follow our prioritized set of actions to protect your organization and data from cyber-attack vectors. Retrieved from https://www.cisecurity.org/controls.

Article Details

How to Cite

Cybersecurity Strategic Plan Part 2. (2024). International Journal of Latest Technology in Engineering Management & Applied Science, 13(7), 197-207. https://doi.org/10.51583/IJLTEMAS.2024.130724

Similar Articles

You may also start an advanced similarity search for this article.