I am Team Australia
Despite work that cyber management teams perform in regard to systems design, network security protocols, hardware and software maintenance, training, policies, implementation, maintenance, and monitoring, breaches can and do occur. In this project, you will work with a team of other cyber professionals to analyze and respond to anomalous network activities.
The graded submission for Project 2 is a packaged deliverable to the CISO about risk and network intrusion, to be completed as a team. The deliverable to the CISO will include the following five parts:
Cybersecurity Risk Assessment including Vulnerability Matrix
Incident Response Plan
Service-Level Agreement
FVEY Indicator Sharing Report
Final Forensic Report
Slide 1: Title
Slide 2: Agenda
Slide 3: The Intrusion
Slide 4: Cyber Security Risk Assessment
Slide 5: Risk and Attack Vectors
Slide 6: Vulnerability and Attribution Analysis
Slide 7: Remediation
Slide 8: Identity and Access Management/others depending on your research of best practices and countermeasures
Slide 9: Security operations/software development security/security assessment and testing/security engineering depending on your research of best practices and countermeasures.
Slide 10: Conclusion
Slide 11: References
Its a lot of information so if you have any questions please reach out.