Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Overig

D489 Cybersecurity Management

Beoordeling
-
Verkocht
1
Pagina's
21
Geüpload op
09-09-2025
Geschreven in
2025/2026

D489 Cybersecurity Management

Instelling
Vak

Voorbeeld van de inhoud

Cybersecurity Management




Cybersecurity Management

Western Governors University




2025

, Cybersecurity Management




A. Summary of the gaps that currently exist Sage’s in “Independent Security Report.”

Sage’s “Independent Security Report”, or aforementioned “ISR,” revealed considerable

gaps in their cybersecurity framework. The gaps will be discussed below.

1. Business Continuity Plan

Sage’s BCP does not encompass the minute details that are important to continue a business in

the event of a natural disaster and no recovery strategies are in place.

2. Inadequate Security Awareness Plan

Sage’s cybersecurity awareness plan is not compliant with the industry’s best practices and

standards in regard to NIST and PCI Requirement 12.6.

3. Inadequate Incident Response Plan

Sage’s IRP does not define roles and responsibilities of team members. The IRP also has

significant shortcomings regarding efficient incident handling and analysis.

4. Inadequate Information Security Team

Sage’s information security team is poorly staffed and is lacking key team members that are

necessary to provide the company with effective security compliance and regulatory efforts.

5. Noncompliance with PCI-DSS and GDPR

Sage currently does not have policies and procedures that would enable it to become and

maintain compliance with two very important global industry standards: PCI-DSS and GDPR.

, Cybersecurity Management




B. Mitigation strategies that were developed to address the gaps identified in Sage’s

“Independent Security Report,” ensuring compliance with PCI DSS and GDPR.




The gaps that were identified in Sage’s ISR were the lack of an adequate business

continuity plan, security awareness plan, incident response plan, and information security team,

leading to non-compliance with the security principles and standards of GDPR and PCI-DSS.

Compliance with these two important standards is essential for international businesses.

The following sections will include mitigation strategies to be implemented to address the gaps

and achieve compliance with the industry’s standards.

1. Business Continuity Plan

The mitigation strategy that was developed to address Sage’s BCP and ensure compliance with

GDPR and PCI-DSS was done by developing a thorough and finely detailed recovery plan that

addresses natural disasters. The new mitigation strategy will be used to ensure European data and

cardholder data protection and quickly recover the systems that store or use this data. The BCP

mitigation strategy will include a risk assessment, business impact assessment, emergency

response plan, communication plan, and backup recovery plan. Editing the business continuity

plan to include these attuned details can ensure that the business can withstand any disaster and

is properly prepared for any unforeseen event that could possibly disrupt the business’s

operations.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
9 september 2025
Aantal pagina's
21
Geschreven in
2025/2026
Type
OVERIG
Persoon
Onbekend

Onderwerpen

$20.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
danicalee

Maak kennis met de verkoper

Seller avatar
danicalee Western Governors University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
8
Lid sinds
8 maanden
Aantal volgers
0
Documenten
3
Laatst verkocht
3 maanden geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen