Question: Final: CPM Course Reflection Paper The Ask: You have the choice to submit your reflection in one of two formats: 1. A Written Reflection: A
Final: CPM Course Reflection Paper
The Ask: You have the choice to submit your reflection in one of two formats: 1. A Written Reflection: A 3-5 page word paper. 2. A Video Reflection: An 8-13 minute video. Regardless of the format you choose, your reflection should be a polished, professional, and an authentic piece of work. What to Include for a Meaningful Reflection: Your reflection should be a cohesive narrative that weaves together different aspects of your course experience. A meaningful reflection will move beyond simply listing what you did and instead explore the impact of those experiences. To guide you, please address the following areas: Connecting the Dots: Select two or three key cybersecurity project management concepts that resonated most with you. How did the simulations allow you to apply these concepts in a dynamic threat environment? How did the case studies and assignments illuminate their real-world complexities in securing projects? How did the guest speakers either reinforce or challenge your ideas with their own experiences? Learning Through Action: Reflect on the major assignments in this course. What did you learn about your own process for identifying risks, managing stakeholders, building a business case, or communicating complex technical issues under pressure? The World as Your Classroom: Provide a specific example of how you have already applied a lesson from this course in your work or personal life. This could be a new way you approached a project's security, a different way you communicated a potential risk, or a shift in how you analyze a business situation you see in the news or experienced first-hand. Charting Your Growth: Think back to our early check-ins. What were your initial hopes and fears for this course? Revisit those early thoughts and reflect on your journey at the green-yellow-red checkpoints. Where did you see the most significant growth in your ability to lead a secure project? The Team Experience: Teamwork is central to effective cybersecurity. o Acknowledge Excellence: Share a specific story of when a teammate's contribution was outstanding in addressing a project's security. What did they do, what was the impact, and what did you learn from them? o Navigating Challenges: Reflect on a difficult moment your team faced related to a security challenge or decision. How did you navigate it together? What did this experience teach you about crisis communication and leadership? Your Future Role in Cybersecurity Project Management: This entire course has been designed to prepare you for a critical cybersecurity project management leadership function. Synthesize your key learnings and articulate a clear vision for the role you will play in managing cybersecurity projects in your future career. How has this course equipped you to be more vigilant, strategic, and a leader? Final Green/Yellow/Red. Where did you end this quarter? Think about each G/Y/R submittal. How do you feel? A Note on Authenticity: The most meaningful reflections will be those that are honest and personal. True growth often comes from unexpected challenges. I encourage you to be candid about both your triumphs and your struggles.
I choose written reflection. Here is the Disney Case Studies assignment from last week: Project MRS 1. Project Charter a. Mission statement: Project MRS Mission Statement: Project MRS aims to seamlessly integrate the security frameworks of The Walt Disney Company and the acquired 21st Century Fox assets, safeguarding intellectual property, mitigating risks, and enabling synergies to drive long-term value in the streaming and entertainment ecosystem. By fostering a unified, resilient security culture, we will protect Disney's expanded portfolio while empowering creative innovation without compromising operational efficiency. b. 3-5 primary objective: Primary Objectives Secure Intellectual Property (IP) Protection: Establish proactive controls to prevent leaks of high-value assets like Avatar sequels and X-Men franchises, directly supporting revenue protection for Disney+ streaming and box office hits (e.g., mitigating potential losses estimated at $1-5 billion per major leak). Achieve Compliance Harmonization: Align global privacy and regulatory programs (e.g., GDPR, CCPA, and Star India's local laws) to reduce legal risks and fines, enabling seamless international operations and market expansion. Optimize Organizational Integration: Bridge cultural divides between Disney's centralized structure and Fox's federated model, retaining key talent and minimizing resistance to ensure uninterrupted content production and innovation. Consolidate Technical Infrastructure: Rationalize disparate tools, identities, and networks to achieve unified visibility and cost efficiencies, supporting faster threat response and scalable growth in the "streaming wars." Drive Business Enablement: Implement risk-based security that differentiates controls for family-friendly vs. mature content (e.g., Deadpool), preserving creative autonomy while enhancing overall brand integrity and global reach. c. Outline a business case Business Case & Key Criteria Qualitative Benefits: Strategic Alignment: The acquisition's value ($71.3 billion) hinges on secure IP integration; leaks could erode trust in Disney+ and dilute brand equity built over decades. Project MRS ensures Disney becomes an unmatched content powerhouse by protecting franchises like The Simpsons and National Geographic, enabling cross- pollination (e.g., X-Men in MCU) without disruptions. Risk Mitigation: Addresses culture clashes, compliance gaps, and tech sprawl that could lead to breaches, regulatory penalties, or talent exodus, preserving the acquisition's synergies in streaming (e.g., controlling Hulu) and international markets (e.g., Star India). Long-Term Enablement: Fosters a unified culture that balances security with creativity, reducing silos and enhancing innovation for future hits Quantitative Benefits (with Assumptions): Assumptions:
Baseline leak risk: Historical industry leaks (e.g., Sony 2014 hack) cost ~$100-500 million per incident; assume 2-3 high-risk events over 24 months without intervention, based on Fox's reactive posture. Compliance fines: Assume $50-200 million potential penalties from unaddressed GDPR/CCPA divergences, drawing from recent cases (e.g., Meta fines). Cost savings: Tool consolidation could reduce licensing by 30-50% (from duplicated vendors); talent retention avoids $10-20 million in rehiring costs. Revenue Protection: Secure IP prevents 10-20% erosion in box office/streaming revenue for key franchises (e.g., Avatar sequels projected at $2-3 billion globally). ROI Calculation: $250 million investment yields ~$1.5-2 billion in avoided losses/savings over 5 years (post-project), assuming 20% annual growth in Disney+ subscribers from secure content pipeline. Expected ROI: Net present value (NPV) of ~$1 billion over 5 years, with a 4:1 benefit-cost ratio (benefits: $1 billion in protected revenue + $200 million savings; costs: $250 million). Breakeven within 18 months via immediate risk reductions. d. Highlight key criteria of the 24-month timeline I structure the 24-month program to protect intellectual property and brand reputation first, then scale automation and cost efficiency. Core foundations such as IAM, SSO, PAM, network segmentation, and logging with observability land early so teams avoid rework and so leak prevention covers high-value titles like Avatar and X Men. External gates set our pace, including audit windows, Star India compliance uplift, vendor renewals, and brand tier decisions that keep adult content on Hulu, Star, and FX while family content remains on Disney Plus. Seasonal change freezes protect peak release periods, so higher risk cutovers move to shoulder months. Every six month phase has hard exit criteria tied to Ally KPIs such as coverage, MTTR, incident and near miss counts, and brand audit results, and also tied to the Thinh business case such as license savings, avoided fines, and breakeven around Month 18. Delivery uses a dual track model for Run and Change, and decisions rely on live telemetry dashboards with explicit adoption targets to address resistance in Fox teams. Resource Allocation Expected Return for $250 Million Budget: Overall Expected Return: As outlined in the business case, the $250 million investment is projected to deliver $1.5-2 billion in value over 5 years through protected revenue (e.g., $1-1.5 billion from leak prevention), cost savings ($200-300 million from tooling/operations), and avoided fines ($100-200 million). This assumes a conservative 10% discount rate for NPV, with benefits accruing from enhanced Disney+ content security driving 15-20% subscriber growth. Breakeven is expected by Month 18, with ongoing annual savings of $50-75 million post-project. Assumptions for Returns and Allocation: Personnel costs based on industry averages (e.g., security experts at $150-250k/year; contractors at 1.5x rate). Technology savings from 40% reduction in redundant licenses (e.g., EDR/firewalls). Process benefits measured by reduced incident rates (20-30% drop) and improved efficiency (e.g., 50% faster onboarding). Inflation at 3%; no major external disruptions (e.g., cyber events).
Cost Breakdown Across Categories: Category Allocation (%) Amount ($M) Justification & Expected Benefits Personnel (New Hires, Contractors, Existing Team Time, Retention Bonuses) 40% $100M - $105M High allocation due to talent gaps (e.g., Fox's lack of app security experts), flight risks, and the need to retain key Fox creative staff through retention bonuses. Includes hiring 50-75 specialists, retaining 100+ Fox staff via incentives, and 20% time from Disney's SOC. Benefits: Reduces attrition by 50%, saving $15M in rehiring costs; ensures continuity in creative production, avoiding disruptions in high-profile projects; builds internal expertise for sustained IP protection, yielding $500M+ in long-term revenue security. Technology (New Tools, Consolidating Licenses) 35% $87.5M Addresses sprawl (e.g., IAM unification, cloud migration). Funds new EDR/firewalls and decommissioning legacy systems. Benefits: 40% licensing savings ($35M over 24 months); unified visibility cuts breach risks by 60%, avoiding $300M+ in potential leaks.
Process (Training, Awareness Campaigns, Consulting Services, Retention Support) 25% $62.5M Focuses on culture (e.g., tailored training for creatives) and GRC consulting. Includes awareness programs, change management, and support for retention bonuses to integrate Fox talent into Disney's culture. Benefits: Boosts adoption by 70%, reduces resistance- related delays; enhances compliance, avoiding $100M in fines; improves efficiency, saving $20M in operational overhead; facilitates smooth integration of key Fox staff and cultural alignment. Gate and Metric Matrix Key Criterion Rationale Trigger or Gate Quantified Exit Owner Partners Crown-jewel first for leak prevention Protect 1 to 1.5B revenue at risk P1 or P2 Pre-release DLP plus EDR on all crown- jewel assets, 0 critical leaks Studio Security Lead SOC, AppSec Dependencies first for IAM, network, and logs Prevent downstream rework and enable Zero Trust M6 IAM and log readiness greater than or equal to 95 percent IAM Lead Network, SOC
Brand tiering for Disney Plus vs Hulu, Star, and FX Preserve brand equity and audience clarity M9 Taxonomy live, brand audit pass Brand Safety Legal, Marketing Star India and vendors Meet global standards and reduce supply chain risk M12 and M18 Vendor tiering at 100 percent, spot audits at least two per quarter GRC Lead Procurement Seasonal freeze Protect peak periods Holidays and summer Zero high risk changes during freeze Change Manager Operations Telemetry driven delivery Evidence beats calendar Quarterl y Live dashboards for coverage, MTTR, and leaks Data Owner Workstream owners 2. Business case resource allocation a. Expected return for 250 billion budget i. Justify allocation percentages and expected benefits 3. Governance model a. Raci matrix b. Gantt chart i. 4 6-month phases of 2-year progress How to read the chart The chart shows 24 months split into four blocks of 6 months. Vertical markers call out M3 Baselines locked, M6 SOC 1.0, M12 Zero Trust slice live, M18 Breakeven, and M24 Closeout.
The bars show when each phase is active. The narrative below uses the same boundaries so the story and the picture line up. Phase 1, Months 0 to 6, Stabilize and Map I stand up the PMO and the basic telemetry so we can see what we have and how it behaves. I confirm asset and identity baselines, push privileged MFA, roll out a first wave of EDR, and connect the top log sources to the SIEM. I draft the network segmentation design and open the risk and brand registers so we track issues from day one. By Month 3 baselines are locked. By Month 6 SOC 1.0 is live with routing, triage, and a simple playbook. Exit means the P0 backlog older than 30 days is down sharply and crown-jewel tracking is in place. Phase 2, Months 6 to 12, Remediate and Integrate I consolidate SSO, enable PAM with just in time access for Tier 0, and enforce patch SLAs so hygiene improves. I pilot the first Zero Trust segment and connect all cloud accounts to CSPM for full coverage. I launch a Secure Editing Cloud pilot to remove friction for Fox creatives and I finalize the brand tier taxonomy that keeps mature titles on Hulu, Star, and FX while family titles remain on Disney Plus. By Month 12 the Zero Trust slice is live. Exit means EDR reaches at least 98 percent, high risk segments are isolated, evidence pack version 1 is ready, adoption of the editing cloud reaches at least 70 percent of the target users, and a brand audit passes. Phase 3, Months 12 to 18, Scale and Automate I scale SOAR so Tier 1 alerts are handled with consistent playbooks. I extend DLP to priority data stores and to the pre release pipeline, add secrets management, and bring SAST or DAST to flagship apps. I run vendor spot audits with a focus on Star India and other high risk partners. By Month 18 the finance model reaches breakeven. Exit means MTTR is down 40 percent from baseline, at least 80 percent of critical apps run through a secure SDLC, and DLP covers at least 75 percent of sensitive repositories. Phase 4, Months 18 to 24, Optimize and Sustain I run purple-team campaigns to validate real control strength. I reduce license overlap and streamline tools so cost and complexity come down. I complete BAU runbooks and hand over ownership to operations, then finish attestations and publish the next 24 month roadmap. By Month 24 the program closes. Exit means two consecutive months of green KPIs, an approved closure report, and an annual run rate of savings in the range of 50 to 75 million. 4. Detailed first 90-day scrum I run two week sprints with a strict Definition of Done that requires the work to be deployed, measured, documented, observable on a live dashboard, and handed to operations with a runbook when it makes sense. The Product Owner who represents security sets priorities, the Scrum Master manages cadence, and workstream leads for IAM, endpoint, network, data, cloud and app security, SOC and compliance, and change deliver with business unit champions. This plan includes people and brand work that connects to Ally risks and the Thinh budget, including a Fox retention pool of 7 to 10 million and an early Secure Editing Cloud pilot.
5. Risk a. Risk equation b. organizational/ cultural risk Resistance from teams from FOX/FX Disney is very compliance-heavy and creatives see such as bureaucratic slowdowns, which does not bode well for tight production deadlines Sprint Dates G Goal Tasks connected to teammates sections KPI or DoD S1 Day 1 to 14 Stand up and baselines Set up Jira, RACI, and RAID, inventory crown-jewel assets, onboard AD and Okta logs, design the Fox retention program with HR and Legal CMDB at least 70 percent, privileged MFA at 100 percent, retention plan approved S2 Day 15 to 28 SOC 1.0 and EDR Deploy EDR to priority domains and servers, stand up triage version 1, run a phishing baseline, announce retention bonuses within the 7 to 10 million pool EDR at least 80 percent, MTTD baseline established, attrition trend flat or improving S3 Day 29 to 42 Access and patching Enable PAM and JIT for Tier 0, rotate service accounts, enforce patch SLAs, shortlist vendors and scope the Secure Editing Cloud POC P0 and P1 backlog down about 40 percent, JIT live, POC contract signed S4 Day 43 to 56 Segmentation and CSPM Pilot micro-segmentation, disable legacy protocols where safe, connect all accounts to CSPM, draft the brand tier taxonomy Performance impact less than 2 percent, CSPM at 100 percent, brand draft reviewed S5 Day 57 to 70 Data and code hygiene Run a DLP pilot on the pre- release pipeline, enable CI secrets scanning, finalize vendor tiering with a focus on Star India DLP true positive rate at least 80 percent, pipeline failure less than or equal to 5 percent followed by tuning, tiering at 100 percent S6 Day 71 to 90 Close and exercise Burn down P0 and P1 items, run cross BU tabletop number 1, publish a brand audit checklist, deliver the executive readout and rolling plan P0 equals 0, after action review items owned and dated, brand checklist signed
Security may look like obstacles and not protections which could lead to staff finding workarounds such as personal emails, external file shares, shadow IT Each "leak" could result in tens of millions in lost box office or streaming value Fox heritage: historically looser, fast-moving culture Perception gap/ comparison: disney= bureaucracy. fox= "creative freedom" Mitigation strategies: Invest in tools that makes their jobs easier: secure editing clouds Data Handling and Supply Chain Complexity Star India has different data handling practices in which their standards may not meet Disney's global compliance obligations, Many vendors/contractors also process the data, which creates thousands of potentially insecure entry points into the new combined network If not integrated properly it could lead to regulatory fines, reputational harm, and supply chain attacks Mitigation strat: Audit Star India's practices and map them against Disney's global standards, go through each vendor and rank them by how sensitive the data is and then bring them to stronger contracts, maybe create a cybersecurity team to monitor such contracts and run spot audits Brand Risk from adopting Rated R content Fox/FX has more adult-oriented content and blending the two under one brand risks confusing target audience, alienate advertisers, enrage parents Disney's brand is their most valuable intangible asset Mitigation strategy: keep adult content under hulu/star/fx NOT under disney+, quarterly brand audits, c. How to win Fox's established employees i. Offer retention bonuses tied to project milestones 1. 7-10 million from 250 million allocated budget 2. Equity or profit-sharing for blockbuster projects a. Keeps high performers invested ii. Nominate fox creatives/managers to colead working groups 6. KPI metrics
Here is the other assignment from Zero-day plan: Week 5: Zero-day Plan -- Team 4
Phase 1: Detection & Initial Response
| Professional | Responsibility |
| Cybersecurity Team | Monitor alerts and anomalies across systems, initiate incident detection procedures, and activate early response protocols. |
| IT Manager | Oversee technical systems involved in detection, coordinate with infrastructure and software teams to identify exposure. |
| NOC Analysts | Monitor real-time network activity, identify abnormal behavior, and help isolate affected network segments. |
| Trading Floor Manager | Report disruptions, coordinate with traders to disable automated trading, and manage initial operational impact. |
| Executive Leadership | Authorize emergency actions, allocate resources, and oversee enterprise-wide risk posture during early detection. |
Phase 1 focuses on the immediate identification of a potential zero-day threat and enacting a rapid response to prevent spread and minimize risk. The professionals involved are the Cybersecurity Team, IT Manager, NOC Analysts, Trading Floor Manager, and Executive Leadership.
The process begins by closely monitoring system anomalies, such as unauthorized access, log manipulation, or trading delays. Any signs of compromise must be quickly validated using SIEM tools and threat intelligence feeds.
Once indicators of compromise are detected, automated trading systems and exposed external services should be disabled to prevent malicious trades or data leakage. Affected systems must be immediately isolated from the network using VLAN controls and endpoint containment tools.
The Incident Response Team (IRT) should be notified, and emergency response protocols should be activated. This includes preparing for deeper investigation, informing key stakeholders, and ensuring clear internal communication across technical and trading departments.
Phase 2: Investigation and Forensics
| Professional | Responsibility |
| Cybersecurity Analysts | Lead forensic review, analyze logs, system behavior, and indicators of compromise to determine root cause and attack vector. |
| Lead Systems Analyst | Map system architecture, identify affected components, and correlate failure timelines to known vulnerabilities. |
| Trading Software Developers | Review internal and third-party codebases, assess integrations for security flaws or known exploits (e.g., Log4j). |
| Infrastructure & Firewall Engineers | Analyze network behavior, inspect firewall rules, and detect unauthorized access or data exfiltration paths. |
| Floor Manager | Assist in mapping operational impacts and correlate real-time disruptions with technical events. |
Phase 2 shifts focus to a deep technical investigation to determine the scope, source, and nature of the zero-day attack. The response team includes Cybersecurity Analysts, Lead Systems Analyst, Software Developers, Infrastructure/Firewall Engineers, and the Floor Manager.
The priority is to preserve forensic evidence, including system logs, memory images, session data, and network packet captures. These assets are vital for later analysis and regulatory review.
Next, the team will identify the exploited componentthis may be a third-party module, trading API, or internal service. If parallels with known zero-day exploits (like Log4j) are found, public threat intelligence may guide containment efforts.
The timeline of the incident must be reconstructed, aligning user activity, trading disruptions, and system logs to visualize the attacker's path. It's critical to assess whether client data, trading algorithms, or execution systems were altered or accessed.
Findings from Phase 2 will guide the containment phase, helping teams isolate compromised areas and determine the next course of action. These findings must be documented and shared with leadership and legal/compliance teams to guide risk decisions.
Phase 3: Containment and Mitigation
| Professional | Responsibility |
| Floor Manager | Report unusual system anomalies, coordinate activities on the trading floor, and manage trading operations |
| IT Infrastructure Team | Execute system diagnostics, assist with the forensic data collection, and keep infrastructure logs |
| Legal & Compliance Officers | Oversee that the industry standards and laws are followed and advise on communication and disclosure policies |
| Cybersecurity Leads | Oversees the process of the incident response strategy under the cybersecurity project manager and the CISO |
Phase 3 begins the technical remediation, securing the system's infrastructure, and eliminating or limiting the mobility of threats. The following professionals are responding in Phase 3: Floor Manager, IT Infrastructure Team, Legal and Compliance Officers, and Cybersecurity Leads.
Coordination among these professionals is essential to contain the impact of the ransomware attack and minimize further damage to the infrastructure. The first step that the professionals' effort will reflect is the network segmentation to block east-west movement between internal systems.
The goal is to limit the attacker's mobility by blocking lateral moves across departments by reconfiguring the Virtual Local Area Network (VLAN). The segmentation also protects databases and trading modules that may be necessary to recover or analyze to prevent further damage.
Vulnerable access points must be locked down, and accounts that are compromised will be suspended immediately. The team will update endpoint security protocols, secure identity access pathways, and eliminate privilege escalations. To address vulnerabilities like Log4j, patching exploited models is underway.
An audit of the Network Operations Center (NOC) telemetry thresholds and the firewall rule sets is necessary to identify misconfigurations that hackers may have created. Inbound and outbound exceptions must be examined, including the validation of signal/noise parameters. After all the activity, the team must verify that the threat detection sensitivity has not been throttled. Leads will oversee the process of the plan implementation and communicate with the project manager and CISO.
Phase 4: Restoration & Recovery
| Professional | Responsibility |
| Cybersecurity Compliance Team | Keeps external mandates while working on reintegration and verifying compliance with internal control |
| Trading Floor Manager | Is in charge of communicating restoration milestones and overseeing real-time traders' readiness. |
| IT Operations Team | Coordinates phase rollouts, rebuilds physical infrastructure, and validates system integrity. |
| Traders & Portfolio Managers | Validate trade logic accuracy, run functional tests, and verify execution workflows |
Phase 4 focuses on restoring system functionalities and trading, with special care related to operational stability and verified integrity. IT has the task of rebuilding the infrastructure with isolated environments. Validation and testing are done separately from the live systems. The functionality, without compromising market data feeds and trading platforms, is scrutinized to ensure optimal cybersecurity.
Unauthorized use is prevented by reestablishing access and identity management tools on the overall infrastructure. Any failed authentication events are immediately reviewed to prevent potential threats to the system. A close examination of trading algorithms enters the reactivation stage while being monitored to ensure cybersecurity and expected functionality. Collaboration and continuous communication between the technical teams and personnel on the trading floor enables both technical teams and trading employees to oversee the reactivation of services.
Regulatory benchmarks are easily met, as cybersecurity compliance is at the center of the system restoration process. Inspecting endpoint defenses, verifying security on data pipelines and data lakes, and confirming audit trail readiness are integral to the company's internal cybersecurity compliance processes. Fallback mechanisms such as shadow trading systems and offline calculators are deployed to monitor dashboards with the goal of safeguarding the overall infrastructure and eliminating post-recovery vulnerabilities and latent threats.
All the company's staff are constantly informed about the restoration progress, updated protocols, and indicators of anomalies to be on the lookout for, to ensure uninterrupted trading activities. The constant attention to communications, protocols, and system updates empowers teams to return to normal trading operations.
Phase 5: Communication & Coordination
| Stakeholder | Responsibility |
| Executive Leadership | Receive high-level updates, authorize resources, and guide enterprise response |
| Corporate Communications | Draft external statements and media talking points to manage public perception |
| Compliance and Legal Teams | Ensure regulatory disclosures align with SEC/FFIEC requirements |
| Client Services | Notify clients of disruptions and provide support channels |
| Regulators (SEC, FFIEC) | Review disclosures for compliance with financial regulations |
Building on prior phases, which identified a phishing-initiated zero-day ransomware attack exploiting a SaaS platform, team #4 Hugo, Thinh, Tony coordinated communication in Second Life. The first-floor tour revealed encrypted transaction systems.
Shared Progress Reports: Internally, we briefed executive leadership via Second Life's boardroom, detailing containment (VLAN isolation from Phase 3) and recovery (partial backups). Externally, corporate communications issued a press release to a media bot, noting a "system disruption" to preserve trust.
Notified Clients: Client services sent notifications via chat to customer bots, addressing tour-observed access issues, confirming delayed trades, and offering a support hotline.
Filed Disclosures: Compliance/legal teams submitted a disclosure to a regulator bot, outlining the attack's scope (halted transactions, potential data risks) and mitigation (endpoint updates per Phase 3), meeting SEC/FFIEC deadlines.
Role-Based Updates: Delivered tailored updates via group chat: leadership got risk summaries, communications received media scripts, compliance/legal got regulatory guidelines, and client services got customer response protocols, reducing confusion amid the chaotic virtual environment (error screens, stressed avatars). Effective communication ensured stakeholder alignment, regulatory compliance, and reduced reputational damage. Client notifications addressed distress, but balancing transparency with legal risks was challenging, informing Phase 6 enhancements.
Phase 6: Post-Incident Review & Readiness
| Stakeholder | Responsibility |
| Cybersecurity Leadership | Lead post-mortem, update incident response strategies |
| IT Strategy Group | Revise system architecture and threat models |
| Risk and Audit Teams | Assess control gaps, schedule audits |
| Trading Operations Leadership | Quantify operational impacts, align recovery with trading needs |
| Legal and Compliance | Ensure regulatory alignment in updated protocols |
With the attack contained (VLAN segmentation, partial backups per Phase 3), we held a post-mortem in Second Life's conference room, engaging stakeholder bots. Tour findings (unpatched SaaS, weak backups) and prior phases (phishing vector, Log4j-like exploit) guided actions.
Cross-Functional Post-Mortems: Via Second Life chat, we confirmed a phishing email exploited a SaaS flaw. Cybersecurity noted unpatched systems; IT strategy flagged poor segmentation, risk teams cited untested backups, and trading operations reported delayed trades.
Updated Playbooks and Workflows: Revised the zero-day playbook, shared virtually, adding phishing detection and vendor audits. Patch workflows were set to 24-hour cycles for critical systems.
Tabletop Exercises and Training: Conducted a ransomware exercise with bots, testing isolation and communication. Launched virtual training on phishing and backups, addressing the tour's weak security culture (no security posters).
Enhanced Threat Modeling and Monitoring: IT strategy updated threat models with zero-day scenarios, shared via a dashboard. Cybersecurity deployed endpoint detection tools, and risk teams scheduled quarterly audits of firewall rules and NOC telemetry.
The review strengthened defenses with updated playbooks, faster patching, and enhanced monitoring. Training improved readiness, addressing tour-observed gaps. Aligning stakeholderpriorities was critical but complex, shaping future resilience.
Can you help me to build the reflection paper based on these previous assignment concepts?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
