Objectives Apply your knowledge of security threat handling procedures to formulate questions about given incident scenarios. Background / Scenario Despite your organizations continued security awareness training, the finance department is still being lured into clicking on malicious email invoice attachments. What new strategies can you take to minimize future attacks? As Cyber Security expert answer the following questions: - 1. Has your organization explored using the DMARC capability to validate authenticity of sender? Is your organization aware that the MS-ISAC provides this capability? 2. Does your security team provide customized awareness and training for the finance department? Does your team know how to identify phishing language? 3. How is your organization made aware of current malicious schemes that might affect you? 4. Is your leadership team engaged and participating in cybersecurity awareness? Your answers should be based on the following links.Use the following URLs for help. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf Equivalent in UK https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file /26 1681/bis-13-1294-uk-cyber-security-standards-research-report.pdf.