Question

In: Computer Science

Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A....

Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A. The Chief Financial Officer (CFO) calls you wondering what should have been done differently during a recent incident involving your predecessor. The following incidents recently occurred and were closed out without any alert to senior staff or the CFO.

The Chief Financial Officer’s admin reported that their laptops were performing erratically and many popup screens kept appearing while browsing the Internet. Upon inspection, it was found that the laptops were infected with malware and computer viruses. As the users were the CFO’s direct subordinates, the service desk decided to respond quickly. However, the service desk did not report the incident up the chain. As soon as the malware was removed, the service desk closed the ticket.

Based on the above information, respond to the following questions:

  • What policies or procedures appear to be missing or are not being followed?
  • What management style or styles should the CISO adopt in dealing with the service desk?
  • How would you recommend the organization to respond to similar incidents in the future?

Solutions

Expert Solution

Sol:

When any malware or attack detected to the company system there need to be followed a certain procedure . several pop-ups appearing in to the desktop screen is a very clear sign of malware .presence .

The procesure that are not followed in this scenario are

* Sudden reporting of the severity of the attack to the higher authority

* The periodicall assessment not happened

* Not checked there are any backdoors are created in the system.

Management style

I will recoment to adapt Pace-setting management style to the CISO . Here in this approach the CISO should lead from the front-end and ensures what all are the preventive steps to be followed . He should give right instruction at the right time and the employees should follow that .

Future recommendation

There are no organisation or sytems safe from the attack . By keeping that in mind we should take preventive measures beforehand . That includes ,

* If any attack happen , address the issue as soon as possible

* Check the entire system to ensure there no back doors are created by the attacker .

* Secure the systems by encrypting the datas

* Should not close the malware checking early , there is a chance of hiding .Hence periodically scan all the systems in the organisation


Related Solutions

You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for contingency planning include: A Recovery Time Objective (RTO) of 4 hours A...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for contingency planning include: A Recovery Time Objective (RTO) of 4 hours A...
During an onsite visit with the Chief Information Security Officer (CISO), he tells you how upset...
During an onsite visit with the Chief Information Security Officer (CISO), he tells you how upset he is that they found Telnet in use by their network administrators. The reason was that the version of the router and switch operating system currently in use does not support security protocols. You assure the CISO that the upgrade will resolve that problem among other weaknesses he might be unaware of. you will act as the network administrator. Suggest some other network security...
Imagine that you are the Information Security Officer (ISO) of your organization. Develop a plan to...
Imagine that you are the Information Security Officer (ISO) of your organization. Develop a plan to conduct a Web application penetration test on your network. Identify and explain all steps necessary to successfully complete the test.
A chief information security officer is creating a security committee involving multiple business units of a...
A chief information security officer is creating a security committee involving multiple business units of a corporation. Which of the following is the best justification to ensure collaboration across business units? A risk to business unit is a risk avoided by all business units, and liberal BYOD policies create new unexpected avenues for attackers to exploit Enterprises single point of coordination is required to ensure cyber-security issues are addressed in protected, compartmentalize groups without business unit collaboration, introduced by one...
a)Imagine that you are the Chief Financial Officer (CFO) of a startup airline company. The executive...
a)Imagine that you are the Chief Financial Officer (CFO) of a startup airline company. The executive management team has tasked you with making a recommendation about whether the company should buy or lease airplanes. Analyze the major pros and cons for leasing and buying assets. Based on your analysis, provide a recommendation to the executive team. b)Compare and contrast the three (3) methods for depreciating plant assets. Recommend the method that maximizes profits for both a shorter period of time...
Imagine that you are the Chief Financial Officer (CFO) of a startup airline company. The executive...
Imagine that you are the Chief Financial Officer (CFO) of a startup airline company. The executive management team has tasked you with making a recommendation about whether the company should buy or lease airplanes. Analyze the major pros and cons for leasing and buying assets. Based on your analysis, provide a recommendation to the executive team. Please cite
The chief operating officer of your company comes to you one morning with the following information...
The chief operating officer of your company comes to you one morning with the following information about firms in your industry:                         Firm                                        Annual Sales (in millions of dollars)             ===============================================                         A                                             $4,200                         B                                             2,200                         C                                             2,300                         D                                             4,700                         E                                              1,000                         F                                                   800                         G                                                  200                         All other firms combined                    $4 million             a) The COO asks you to calculate the industry’s...
Imagine you are the chief financial officer of a company with valuable internally created intangible assets....
Imagine you are the chief financial officer of a company with valuable internally created intangible assets. Create an argument supporting the inclusion of the intangibles on the balance sheet at fair market value. What are the risks and challenges involved in assigning a dollar value to internally created intangible assets?
Imagine you are the chief financial officer (CFO) of a corporation with plans to complete the...
Imagine you are the chief financial officer (CFO) of a corporation with plans to complete the acquisition of a key subsidiary this year. Your chief executive officer (CEO) has requested a presentation to the board of directors describing the methods available to account for the acquisition internally and the best method for the company during the acquisition year. Please assess the value of each method identified in your presentation to the board and support your recommendation with examples. Respond to...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT