You are tasked as the Chief Information Security Officer for a large Fortune 500 International Firm to plan, develop and manage the functions that oversee a new large scale Cybersecurity program. The large scale Cybersecurity program will be a “Digital Blackwater” type organization (see the description below of “Private or Mercenary Armies” from the textbook).
For the purpose of this assignment, you are to search the Internet and utilize course reading materials to research the types of functions, strategies and tactics this organization will use for this new program. Use your imagination and name your proposed organization and follow the requirements below:
4 – 6 Pages in length in APA format (not including a cover page and reference section)
Cover Page
Introduction – Firm name and overview of its purpose
Technical organizational proposal:
Value proposition for the new organization
Functions of the organization including management
How the organization will address dynamic Cyber risk and threat environments
Strategies and tactics the organization will employ
Proposed benefits for the U.S. government
How will the organization make a profit
Reference Section
Use current and real world data to make your points, not just the textbook
Your references should not be more than 5 years old
Your assignment is due by Sunday not later than 11:59 p.m. Eastern time.
Private or Mercenary Armies
In an age where cyber warfare is more common than the physical battlefield, it may be necessary for the private sector to stop playing defense and go on offense, Gen. Michael Hayden said on August 1, 2011. Hayden, who led the National Security Administration and Central Intelligence Agency under president George W. Bush, said during a panel discussion at the Aspen Security Forum in Aspen, Colo. that the federal government may not be the sole defender of private sector companies—and that there is precedent for such action. “We may come to a point where defense is more actively and aggressively defined even for the private sector and what is permitted there is something that we would never let the private sector do in physical space,” he said. “Let me really throw out a bumper sticker for you: how about a digital Blackwater?” he asked. “I mean, we have privatized certain defense activities, even in physical space, and now you have got a new domain in which we donot have any paths trampled down in the forest in terms of what it is we expect the government—or will allow the government—to do”. Blackwater is a private military contractor that has changed its name to Academi after incidents in Iraq gave them a negative image. If companies decide to hire forces (hackers) to strike back or conduct recovery operations it could change the cyberspace battlefield dramatically (Winterfield and Andress, 2013).
Aethon: A Proactive Cybersecurity Defense Initiative
Cover Page
Title: Aethon: A Proactive Cybersecurity Defense Initiative Author: [Your Name] Course: [Course Name] Instructor: [Instructor Name] Date: [Date]
Introduction
Firm Name: [Your Company Name]
[Your Company Name] is a leading Fortune 500 international firm operating in the [Industry] sector. We are dedicated to providing innovative [Products/Services] to our global customers. In today’s digital age, cybersecurity threats are an ever-present concern. These threats can disrupt operations, damage our reputation, and compromise sensitive data. To address these growing challenges, [Your Company Name] is proud to announce the launch of Aethon, a comprehensive large-scale cybersecurity program.
Technical Organizational Proposal
Value Proposition
Aethon goes beyond traditional reactive security measures. We believe in proactive defense that anticipates and mitigates cyberattacks before they occur. Our team of highly skilled cybersecurity professionals will work diligently to:
Functions of the Organization
Aethon will comprise several dedicated teams, each with a specific focus:
Management
Aethon will be led by a Chief Security Officer (CSO) who reports directly to the Chief Information Officer (CIO) and the CEO. The CSO will be responsible for the overall strategy, budget, and performance of the program. Each team within Aethon will have a dedicated team leader with relevant expertise and experience.
Addressing Dynamic Cyber Risk Environments
Aethon recognizes that the cyber threat landscape is constantly evolving. We will employ several strategies to remain proactive:
Strategies and Tactics
Aethon will utilize a combination of offensive and defensive strategies to achieve optimal security: