Using Below information prepare ppt presentation with 10 slides without plagiarism. Make sure you should cover part 1 and part 2 points
ABC Company is a manufacturing company that produces new technology that sells online directly to customers and retailers. The system they use is a core transactional Enterprise Resource Planning system called NEDS. NEDS is similar to many core systems that provide integrated applications on a common platform for financials, managing materials, sales distribution, and production planning (similar to Oracle or SAP). NEDS is located in the Netherlands, while ABC Company is located in Florence, Kentucky. On June 15, 2018, James Hurd (ABC’s Global Security Director) was notified that NEDS was burglarized during business hours involving individuals stealing equipment including blackberries, iPhones, laptops and hard drives.Local police were notified and the incident was reported on that date. A police report only included identification of specific hardware that was stolen and several bicycles.
The burglary notification that was mailed was sent to a branch office of ABC Company in Mexico. James Hurd was notified by the Mexico office via email which included an attached electronic version of the burglary notification and police report on June 20, 2018. James Hurd recognized that the incident actually occurred 5 days earlier.
The letter contained the following information about the incident:
- The incident occurred in the application area that provides custom application development and reporting for the ABC Company.
- The area that was impacted involved “potential data” used for sales analysis. Data from the ABC Company had been placed on laptops while some diagnostics were being carried out.
Compromised data could have included customer or retailer information from 2002-2014 consisting of names, address, bank account data or credit card numbers, SKU product numbers, descriptions, quantities, Purchase Order numbers, and purchase price
- Upon creating the ABC Company’s Security Incident Response Policy, develop your action plan to evaluate this data incident. Capture this action plan in a PPT presentation. Include the following:(50 pts) PPT Part 1
Summarize the data incident and potential level of risk, include why?
Describe an action plan to evaluate and close the incident
Describe how the Incident Response Team Charter supported your actions
Describe how the Incident Response Policy supported your actions
Identify any issues that made the evaluation more difficult
Identify areas of future risk mitigation actions should a similar incident occur (look at the gaps or issues with this scenario)
Close the incident (NOTE: The outcome of the incident did not surface any major risks or data breach to the company, but it took the evaluation to get to this conclusion)
- Upon creating the ABC Company’s Security Incident Response Policy, evaluate the security incident described above and add the following content to the PPT created above.Please addresses the following: (50 pts) PPT Part 2
Discuss the benefits of a security incident response team
Discuss the benefits (if any) of the IRT Charter
Identify the major elements of a security incident response methodology
Align the roles and responsibilities to elements of a Security Incident Response team
Identify critical management human resources, legal, IT, and information systems
Identify the types of data that could potentially be impacted and what laws/regulations could be in violation of non-compliance if this data was breached