Company Capital One is a financial institution that experienced.docx
1. Company Chosen: Capital One is a financial institution that experienced
Company Chosen: Capital One is a financial institution that experienced a data breach in
2019You have been hired by a corporate client to conduct a cybersecurity risk
assessment. They will be looking to you to map their current practices against the NIST CSF
framework and to provide recommendations on how to enhance their security
posture. Because your client’s resources are limited, they have asked you to focus only on
5-7 of out of the 108 NIST sub-categories and would prefer that the selected sub-categories
fall into at least 3 of the 5 NIST functions. As a final deliverable, the client has asked you to
provide them with a cyber risk assessment report that they can present to their board in
order to procure financing to address cyber risk. This final deliverable will be the final
project for our class.Who is your client? We will ask you to select a company where there is
enough public information to be gathered in order to perform this assessment. Generally,
companies do not make their security practices available to the public. However, when
there is a data breach, information comes out in connection with litigation and regulatory
scrutiny. For purposes of this final project you will select a company that (i) has been
breached; and (ii) about whom there is enough information regarding the flaws in its
security program to complete the project. You will be providing the security assessment as
though you learned all of the information BEFORE the breach.What to look for when
selecting your company. You should research companies which have had signification data
breaches and then look for FTC consent orders and/or court decisions to ensure relating to
the breach so you will have the data you need to complete the project. Additionally, there
needs to exist a logical connection between the breach and missing controls (subcategories)
so that you will be able to make appropriate recommendations. This connection can be
established in two ways:The missing control was specifically mentioned in the publicly
available research. If this is the case, you can just reference the information that you
found.You were able to make a case that this control was missing based on other
information uncovered in the course of your research. In this case, you need to explain how
you reached this conclusion. For example, if the research specifically mentioned that the
breach occurred because the data in the database was not encrypted, you could say that the
control. DS-1: Data-at-rest is protected was missing. You could, however, also probably
extrapolate that GV-4: Governance and risk management processes address cybersecurity
risks was also missing. In this case, you would need to provide an explanation of why you
think that was the case (provide logical connection between other information in the case
and this specific control)Report components. Your report should have the following
2. sections:A. Cover PageB. Table of ContentsC. Executive SummarySummarize the purpose of
the risk assessment.Describe the scope of the risk assessment. State that this is an initial
risk assessment.Describe the overall level of risk (e.g., Very Low, Low, Moderate, High, or
Very High).D. Body of the ReportDescribe the purpose of the risk assessment, including
questions to be answered by the assessment. Summarize risk assessment
results. Describe in detail how you arrived at the risks and risk levels contained within
your report (you should plan to dedicate one (1) slide / page per risk in the report). Provide
recommendations that can remediate the missing or weak sub-categories identified.E.
AppendicesList references and sources of information