Identify the three highest priority changes that need to be made to the Deloitte security program.

Unlimited Attempts Allowed Guidelines: At the instructor’s discretion, this may be assigned as a small group or individual assignment. This is an individual writing assignment. Submit an original work addressing the topic and questions provided and other relevant factors you may think of beyond the questions provided here. Although the questions above should be used in guiding your written response, you should not include the question in the essay that you write—develop your report/essay. Do not have your paper appear in question/answer format. The assignment should be in report/essay format using APA formatting (student version). The Purdue OWL (link included in the course materials) is a great resource for APA formatting and reference formatting. A title page is required for proper APA format (student version). Review APA formatting so that you include all necessary information on the title page. A sample title page is included in the class announcements. If you use material from any outside sources (i.e. the Internet), be sure to cite the source in the body of the paper where you use the information and provide an APA-style reference at the end of the paper. Notice that there are sources referenced for the information in the assignment. These, along with any additional sources you use, should be included in your References page, using correct APA format. The expected word count is 400-500 words, excluding the information on the title page and the reference page. The word count is from the title of your document on the first information page (not the title page) through the entire body of the document, up to (but not including) the reference page. Be sure you meet the minimum, but if you go over the 500-word count that is fine. That actually demonstrates the effort that you put forth on the writing assignment. A plagiarism checker is used, so be sure to cite and reference any outside source material. You are writing with a professional audience in mind, so be sure to use a professional tone. Do not use a familiar tone as you might use when discussing this with a friend. All writing assignments (and any writing assignments requiring research) should be written in third person, which means there should be NO first/second person references such as you, I, we, our, your, my, etc. used in your document. Some additional things to remember in your writing, along with examples, include: Avoid abbreviations, spell out words–tech should be technology, info should be information Tell what an acronym stands for the first time used–Ivy Tech Community College (ITCC) Avoid contractions, spell out words–wouldn’t should be would not. Save the file as a.doc or .docx word processing file. Please do not save the file as a .pdf or pages file. Security Consultant Suffers Cyberattack AACSB Standard: Global, Data Protection Deloitte is one of the biggest professional services companies in the world based on both revenue ($38.8 billion in 2017) and number of professionals (over 263,000). It provides audit, tax, management consulting, financial advisory services, and cybersecurity guidance to over 85 percent of the Fortune 500 companies and more than 6,000 private and middle market companies around the world. Its global headquarters is in New York. In April 2017, the company discovered that its global email server had been hacked starting six months earlier. The hackers gained access to the system through an administrative account that granted them privileged, unrestricted access to all areas. Apparently, the account required just a single password and did not have two-step verification. Deloitte offers its clients advice on how to manage the risks posed by sophisticated cyberattacks. It also operates a CyberIntelligence Center to provide clients with around-the-clock business focused operational security. In 2012, Deloitte was ranked the best cybersecurity consultant in the world. The firm earns a portion of its $12 billion a year in consulting fees from these services. The breach was a deep embarrassment for the firm. The use of email is interwoven into the operational fabric of the modern organization and is used to communicate all sorts of sensitive information—new product plans, marketing strategies, merger and acquisition tactics, product designs, patent data, copyrighted material, and trade secrets. The server that was breached contained the emails of some 350 clients including the U. S. State Department, Department of Homeland Security, Department of Defense, Energy Department, and the U. S. Postal Service. Also compromised were the emails of the United Nations, National Institute of Health, and housing giants Fannie Mae and Freddie Mac, plus some of the world’s biggest multinationals. In addition to emails, the hackers had potential access to usernames, passwords, and IP addresses. Initially Deloitte kept the breach secret electing to inform only a handful of senior partners, six clients the firm knew to have been directly impacted by the attack, and lawyers at international law firm Hogan Lovells. The Washington- based firm was retained to provide legal advice and assistance about the potential fallout from the hack. Deloitte formed a team consisting of security analysts and experts from both within and outside the firm to conduct a formal inquiry to the breach. The goals were to understand how this happened, assess the scope of the incident, determine what the attacker targeted, evaluate the potential impact to clients, and determine the appropriate cyber-security response. After six months elapsed time, the team determined that the attacker was no longer in the email system, ascertained that there had been no business disruption to any of its clients, and recommended additional steps to enhance Deloitte’s overall security. The team was unable to determine whether a lone wolf, business rivals, or state-sponsored hackers were responsible. The attack illustrates that any organization can fall prey to a cyberattack—even those whose specialty is to stop them. Critical Thinking Questions Identify what you believe to be the area of most severe consequences for Deloitte—direct impact, business disruption, recovery, legal, or reputation. Justify your response. How would you evaluate Deloitte’s response to this cyberattack? What did they do well? Where could they have done better? Identify the three highest priority changes that need to be made to the Deloitte security program. Sources: Brian Krebs, “Deloitte Breach Affected All Company Email, Admin Accounts,” Krebs on Security, September 17, 2017, https:// krebsonsecurity.com/2017/09/source-deloitte-breach-affected-allcompany- email-admin-accounts; “Deloitte Statement on Cyber-Incident,” September 25, 2017, https://www2.deloitte.com/global/en/pages/ about-deloitte/ articles/deloitte-statement-cyber-incident.html; “Here’s How Many Deloitte Clients were Impacted by Hacking,” Fortune, October 10, 2017, http://fortune.com/2017/10/10/deloitte-clientshacking; Nick Hopkins, “Deloitte Hit by Cyber-Attack Revealing Clients’ Secret Emails,” The Guardian, September 25, 2017, https://www .theguardian.com/business/2017/sep/25/deloitte-hit-by-cyber-attack-revealing- clients-secret-emails; and “Key Facts About the Deloitte Email Cyber-Incident,” Deloitte, October 6, 2017, https://www2.deloitte.com/ content/dam/Deloitte/global/Documents/About-Deloitte/gx-FactsSheetforGlobalWebsite- cyber-attack.pdf. follow as given instruction apa student version do as instructed.

Last Completed Projects

topic title academic level Writer delivered