CST 630 UMGC Cybersecurity Technology Strategic Plan Presentation
The world of technology is changing at an unprecedented pace, and these changes represent business opportunities as well as challenges. Mass connectivity and faster speeds create opportunities for businesses to network more devices, complete more transactions, and enhance transaction quality. Internet Protocol version 6 (IPv6) and internet of things (IoT) are two such technologies that represent significant opportunities for strategic cybersecurity technology professionals to create lasting value for their organizations. IoT is the phenomenon of connecting devices used in everyday life. It provides an interactive environment of human users and a myriad of devices in a global information highway, always on and always able to provide information. IoT connections happen among many types of devices—sensors, embedded technologies, machines, appliances, smartphones—all connected through wired and wireless networks. Cloud architectures such as software as a service have further enabled big data analytics and improvement in areas such as automated manufacturing. Data and real-time analytics are now available to workers through wearables and mobile devices. Such pervasive proliferation of IoT devices gives hackers avenues to gain access to personal data and financial information and increases the complexity of data protection. Given the increased risks of data breaches, newer techniques in data loss prevention should be examined. Increased bandwidth and increased levels of interconnectivity have allowed data to become dispersed, creating issues for big data integrity. In such a world, even the financial transactions of the future are likely to be different—digital currencies such as Bitcoin may be used for some future financial transactions. To survive and thrive, organizational technology strategists must develop appropriate technology road maps. These strategists must consider appropriate function, protection, and tamper-proofing of these new communications and transactions. It will be impossible to protect data by merely concentrating on protecting repositories such as networks or endpoints. Cybersecurity strategists have to concentrate on protecting the data themselves. They will need to ensure that the data are protected no matter where they reside. In this project, you will compile a technology strategy plan for your organization to protect data throughout the company. There are 10 steps in the project, which will include a 12- to 15-page report, slide presentation, and lab report(Don’t worry about the lab report). First, begin with the project scenario above, and then move to Step 1. Deliverables A Cybersecurity Technology Strategic Plan, about 12 to 15 double-spaced pages in a Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list in your plan. A set of about five to 10 narrated PowerPoint slides (written narration or in-class presentation can be substituted for audio/video narration) as an executive overview briefing that reflects the key elements of your team plan. Step 1: Don’t worry about this step Step 2: Select Devices and Technologies It's time to get the details about the devices and technologies needed to be included in the Strategic Technology Plan for Data Loss Prevention. You should limit the scope of this project by selecting a set of devices and technologies that are most appropriate for data loss prevention for your business mission and future success. Based on your prior knowledge of your company, perform a research on the following topics and identify a set of devices and technologies that you propose for your company, and your business rationale for selecting them: IPv6 internet of things (IoT) data loss prevention that covers: data loss prevention big data analytics big data integrity blockchain data obfuscation data masking operational context/context-aware security data tokenization tamperproofing data governance include significant detail about these technologies, what kinds of IoT devices will be appropriate for the company's use. During your research, you should also see if there might be any issues for integration and implementation, which you will consider in greater detail in a later step in the project. When you've finished detailing the proposed devices and technologies, move to the next step, where you will outline your goals on how the devices and technologies will ensure the company is prepared for future vulnerabilities. Step 3: Develop Goals and Objectives After outlining the proposed devices and technologies for the data loss prevention plan. Next, focus on the organizational mission and develop a set of goals and objectives to show how your set of chosen devices and technologies will help your company prepare for the future. Include a discussion for deploying, maintaining, and securing these devices and technologies. include a discussion on the devices and technologies' impact to the existing company infrastructure and security. When you've completed this section, move to the next step, where you will conduct a detailed analysis of each device and technology. Step 4: Prepare a SWOT Analysis Table You've identified the technologies and devices, and listed the goals and objectives for their use in the organization. In this step, you will justify adding these devices and technologies to the network infrastructure. In order to do this, perform a strengths, weaknesses, opportunities, and threats (SWOT) analysis of each device/technology being introduced into the infrastructure. A SWOT analysis is a framework that allows you to identify internal and external factors that can affect the implementation of new technology. Such a process can be helpful for decision making and strategic planning. Look at internal and external factors that could influence the successful introduction with respect to the company specific business model and operations. Internal factors are the strengths and weaknesses you found. External factors are the opportunities and threats identified during the SWOT analysis. Determine what these are. Address the following questions in your discussion: How do they influence the operation and maintenance of the network? What can be done to overcome these factors? As cybersecurity professionals, you should stress security-related analysis and create a SWOT chart that includes internal and external factors. This chart and the overall analysis should be a significant part of the Strategic Technology Plan for Data Loss Prevention. In the next step, you will consider any issues that might come up when you integrate and implement the new devices and technologies. Step 5: Address Integration and Implementation Issues You have now completed the SWOT analysis and chart. In this step, consider integration and implementation issues you anticipate when you introduce the new devices and technologies network. Integration issues are problems that can arise when you try to implement them into the infrastructure. These include incompatibility issues with existing software and databases, operating systems, network routers, or switches and communications protocols. You will need to address legacy devices in the infrastructure that could cause problems with your implementation. Such devices may have older technologies and can stop working in the new environment or be unable to communicate with these new systems. You may also encounter some infrastructure issues to consider. Include such issues in your discussion. You may want to revisit some of the early research you conducted earlier in the project when you considered the devices and technologies that would be appropriate for the Strategic Technology Plan for Data Loss Prevention. Step 7: Plan People, Process, and Data Governance Issues In this step, you will consider some overall issues for implementation. People, process, and data governance are some of the most important aspects of deploying technology. During this step, think about what processes might already be in place and what changes will be required by the introduction of the new devices and technologies. Think of governance, personnel changes, hiring, and training requirements for users and systems administrators. Determine any gaps or shortcomings that will need to be addressed now or in the future. Think of what accommodations are needed to handle the new technology being deployed in the network. This is an important aspect of the Strategic Technology Plan for Data Loss Prevention. Step 8: Finalize the Report Now that the sections of your Cybersecurity Technology Strategic Plan have been addressed and developed, you must compile, review, edit, and proofread all parts of the plan and determine if there are any other challenges to address. Consider the following: Have you missed discussing some key impact to the organization and its network infrastructure? In the future, what will the organization need to do to meet its goals and objectives? How will your organization ensure continuous improvement? Are there any roadblocks? How can they be overcome? Your plan should be about 12 to 15 double-spaced pages, submitted as a Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list in your plan. Provide a one-page executive summary at the beginning of the paper. In the next step, you will work on a presentation. Step 9: Develop the Team Presentation In the previous step, you completed the plan and executive summary. Now, you will prepare to present your plan to the executive team in an engaging and professional manner. To do this, compose an asynchronous presentation using a set of about five to 10 PowerPoint slides. Your presentation should be a high-level executive overview that reflects the key elements of your plan. When this step is complete, move along to the final step, where you will submit all the components of your project assignment. Step 10: Submit Your Report and Presentation In this final step, You will need to submit the following: A Cybersecurity Technology Strategic Plan, about 12 to 15 double-spaced pages in a Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list in your plan. A set of about five to 10 narrated PowerPoint slides (written narration or in-class presentation can be substituted for audio/video narration) as an executive overview briefing that reflects the key elements of your plan. Lab results (Don’t worry about this).