SlideShare a Scribd company logo
1 of 12
DIAMOND HANDS
HOLDINGS INC.
(DHHI)
B O A R D R E P O R T
Lauren Campbell
CYBR 7930
Dr. Mattord
Summer 2023
Introduction
Diamond Hands Holdings Inc. offers multiple customers with different services in
the realm of information technology. Because they offer services in the realm of
information technology, a continuous effort regarding the evaluation, protection,
and service must be a priority for the company. The Security Services Plan (SSD)
created for Diamond Hands Holdings Inc. covered all three racks in the Appendix
B Asset Inventory. Because the DDHI Secured Server Data Center consists of
different departments and uses different sources to perform day to day operations
for the company, I had to deeply analyze each area. The receiver of service,
frequency, justification, expenditure, and cost recovery for each service in the
directory are crucial to the operations design needed to protect the organization’s
assets and risks.
The purpose of this Security Operations Design is to provide the customers of
Diamond Hands Holding, Inc. (DHHI) with a comprehensive list of all security
operations deliverables and the improvement of how they operate in using the
platform. Threats to information and data are constantly occurring, and it is crucial
that DHHI follows this plan to protect the company, the stakeholders, and all
customers.
2
INTENDED AUDIENCE BOARD MEMBERS
CEO SHAREHOLDER SHAREHOLDER EXECUTIVE BOARD
MEMBER
3
AGENDA
Projected Revenue
Current Security Operations
Intended Security Operations
Budget
Improvement Program
Summary & Questions
4
Projected Revenue
$150 MILLION
• We project to continue to grow this number
as our strategic plans are put into place. The
budget allocation of only $50,000 to start
our plans includes recruitment costs,
training expenses, consultant fees,
technology investments, and other relevant
expenditures. Our appropriate resource
allocation and implementation of all
projects will only increase the revenue of
DHHI.
Current Security Operations
Contingency Planning, Incident Response, and
Discovery Recovery
Contingency planning involves the preparing
for potential disruptions, disasters, or
unforeseen events that could impact the
normal operations of an organization. The
Incident response is the process of effectively
handling and managing security incidents or
breaches when they occur. Disaster recovery
focuses on restoring the organization's IT
infrastructure and systems after a significant
disruptive event, such as a natural disaster,
hardware failure, or cyber-attack, that causes
widespread system outages or data loss.
DHHI has an established plan that
incorporates all the above areas to ensure
the integrity and confidentiality of the
company.
Encryption
Encryption is the process of converting data
into a coded form known as ciphertext and
making it unintelligible to unauthorized users.
This is essential for companies to have as it
helps them protect sensitive information and
ensure data confidentiality. DHHI has
implement many solutions and detection
services that detect and handle files that
come in that are malware.
Other Operations: Antivirus,
Authentication Applications, Email and
Messaging Use, Ethics Policy, and
Firewall
Intended Security Operations
Risk Management
DHHI should assess the risk
management of their infrastructure
so they can assess the protentional
threats, assists, vulnerability, and
controls of the information systems
they are using and compare it to the
occurrence of certain threats they
are at risk of. Risk management is
the process of identifying, assessing,
and prioritizing risks to an
organization and then taking the
appropriate actions to mitigate or
manage those risks effectively. It
involves understanding potential
threats and vulnerabilities,
evaluating the potential impact of
risks, and implementing strategies
to reduce or eliminate them.
Physical and
Environmental
Security
• Physical and environmental
security focuses on protecting
an organization's physical
assets, facilities, and the
surrounding environment from
unauthorized access, damage,
and disruptions. It involves
implementing measures to
secure the physical premises,
equipment, data centers, and
other critical infrastructure
components. DHHI should
make sure their server rooms
are secured to only people
who should be able to enter.
They should hire security to
protect the physical office, as
well as a virtual security
system that looks out for
breaches and attacks.
Camera, motion detectors,
and security alarms are also
very important features to be
added.
Compliance &
Regulatory
• Compliance and
Regulatory
compliance consists
of multiple audits and
assessment being
performed to ensure
the company and its
staff members are
staying up to date on
all laws, regulations,
and certification
measures.
• Vulnerability Management
• Create management team
• Assess vulnerabilities and risk
• Security Awareness and Training
• Monitoring and Review
• Application Security
• Securing development practices
• Creating a team to handle data encryption
• Securing and assessing data
• Access Control and Provisioning
• Implement Single Sign on and Multi- factor authentication
• Create a training program and access provision team
• Analyze patch and vulnerability management
1.Physical and Environmental Security
• Gain security
• Purchase cameras, motion detectors, and security alarms
• Development policies and procedures
• Create training classes for employees
• Threat Detection & Intelligence
Develop threat intelligence
prosecutes
• Threat intelligence gathering and
analysis
• Monitoring, analysis, and adaption
• Incidence Response
• Threat detection and intelligence
• Create a team that can understand
the nature of the attack
• Identify affected systems and create
plan to mitigate the damage
• Disaster Recovery
• Develop disaster recovery team
• Create playbook, testing, and
exercise plans
• Create strategies and procedures
• Risk Management
• Assess risks
• Complete risk assessment
• Document and treat risk areas
Budget
Improvement Program
Subtitle
• Open the Design
Ideas pane for
instant slide
makeovers.
• When we have
design ideas, we’ll
show them to you
right there.
The improvement program
shows a breakdown over the
next 5 years that analyzes which
areas need to be improved upon.
In each area the operations team
will need to track the
occurrences, the effects,
ownership, resource estimates,
due dates, completion, and
status. In the span of five years,
there should be a decrease in
risk in the areas we are worried
about in terms of security and
compliance.
Summary
The DDHI Security Operations Plan covers
every area DHHI should consider mitigating
risks, prevent breaches, reduce threats to
information assets, reduce
downtime/recovery time and data loss, and
ensure compliance at all levels. The
approach is created with the intent and
understanding of DHHI’s services and
information systems. The services are
intended to protect the company,
employees, clients, and stakeholders.
Implementing these facilities will reduce
risk, reduce overhead, reduce time, and act
as an aid in the recovery and planning of
potential attacks that could occur. The cyber
security, physical security, and digital
security DHHI and the implementation of the
above services is critical and crucial to
providing a secure environment to DHHI’s
staff, contractors, vendors, and clients.
These services will contribute to the feeling 11
THANK YOU
Lauren Campbell
Questions? You can reach me at
Lcampb45@students.kennesaw.edu
12

More Related Content

Similar to DDHI Board Report.ppsx

Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance EyesOpen Association
 
How to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdfHow to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdfJose thomas
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfEnhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfSA Consultants UAE
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 
Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationAchieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationThomas Bronack
 
Management of Risk and its integration within ITIL
Management of Risk and its integration within ITILManagement of Risk and its integration within ITIL
Management of Risk and its integration within ITILhdoornbos
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...cyberprosocial
 
vertical in CISA certification and Five Domains are in CISA
vertical in CISA certification and Five Domains are in CISAvertical in CISA certification and Five Domains are in CISA
vertical in CISA certification and Five Domains are in CISAarjunnegi34
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 

Similar to DDHI Board Report.ppsx (20)

Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
 
How to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdfHow to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdf
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfEnhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
 
Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate CertificationAchieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate Certification
 
Management of Risk and its integration within ITIL
Management of Risk and its integration within ITILManagement of Risk and its integration within ITIL
Management of Risk and its integration within ITIL
 
IT WORK SAMPLES
IT WORK SAMPLESIT WORK SAMPLES
IT WORK SAMPLES
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
vertical in CISA certification and Five Domains are in CISA
vertical in CISA certification and Five Domains are in CISAvertical in CISA certification and Five Domains are in CISA
vertical in CISA certification and Five Domains are in CISA
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 

Recently uploaded

Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 

Recently uploaded (20)

Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 

DDHI Board Report.ppsx

  • 1. DIAMOND HANDS HOLDINGS INC. (DHHI) B O A R D R E P O R T Lauren Campbell CYBR 7930 Dr. Mattord Summer 2023
  • 2. Introduction Diamond Hands Holdings Inc. offers multiple customers with different services in the realm of information technology. Because they offer services in the realm of information technology, a continuous effort regarding the evaluation, protection, and service must be a priority for the company. The Security Services Plan (SSD) created for Diamond Hands Holdings Inc. covered all three racks in the Appendix B Asset Inventory. Because the DDHI Secured Server Data Center consists of different departments and uses different sources to perform day to day operations for the company, I had to deeply analyze each area. The receiver of service, frequency, justification, expenditure, and cost recovery for each service in the directory are crucial to the operations design needed to protect the organization’s assets and risks. The purpose of this Security Operations Design is to provide the customers of Diamond Hands Holding, Inc. (DHHI) with a comprehensive list of all security operations deliverables and the improvement of how they operate in using the platform. Threats to information and data are constantly occurring, and it is crucial that DHHI follows this plan to protect the company, the stakeholders, and all customers. 2
  • 3. INTENDED AUDIENCE BOARD MEMBERS CEO SHAREHOLDER SHAREHOLDER EXECUTIVE BOARD MEMBER 3
  • 4. AGENDA Projected Revenue Current Security Operations Intended Security Operations Budget Improvement Program Summary & Questions 4
  • 5. Projected Revenue $150 MILLION • We project to continue to grow this number as our strategic plans are put into place. The budget allocation of only $50,000 to start our plans includes recruitment costs, training expenses, consultant fees, technology investments, and other relevant expenditures. Our appropriate resource allocation and implementation of all projects will only increase the revenue of DHHI.
  • 6. Current Security Operations Contingency Planning, Incident Response, and Discovery Recovery Contingency planning involves the preparing for potential disruptions, disasters, or unforeseen events that could impact the normal operations of an organization. The Incident response is the process of effectively handling and managing security incidents or breaches when they occur. Disaster recovery focuses on restoring the organization's IT infrastructure and systems after a significant disruptive event, such as a natural disaster, hardware failure, or cyber-attack, that causes widespread system outages or data loss. DHHI has an established plan that incorporates all the above areas to ensure the integrity and confidentiality of the company. Encryption Encryption is the process of converting data into a coded form known as ciphertext and making it unintelligible to unauthorized users. This is essential for companies to have as it helps them protect sensitive information and ensure data confidentiality. DHHI has implement many solutions and detection services that detect and handle files that come in that are malware. Other Operations: Antivirus, Authentication Applications, Email and Messaging Use, Ethics Policy, and Firewall
  • 7. Intended Security Operations Risk Management DHHI should assess the risk management of their infrastructure so they can assess the protentional threats, assists, vulnerability, and controls of the information systems they are using and compare it to the occurrence of certain threats they are at risk of. Risk management is the process of identifying, assessing, and prioritizing risks to an organization and then taking the appropriate actions to mitigate or manage those risks effectively. It involves understanding potential threats and vulnerabilities, evaluating the potential impact of risks, and implementing strategies to reduce or eliminate them. Physical and Environmental Security • Physical and environmental security focuses on protecting an organization's physical assets, facilities, and the surrounding environment from unauthorized access, damage, and disruptions. It involves implementing measures to secure the physical premises, equipment, data centers, and other critical infrastructure components. DHHI should make sure their server rooms are secured to only people who should be able to enter. They should hire security to protect the physical office, as well as a virtual security system that looks out for breaches and attacks. Camera, motion detectors, and security alarms are also very important features to be added. Compliance & Regulatory • Compliance and Regulatory compliance consists of multiple audits and assessment being performed to ensure the company and its staff members are staying up to date on all laws, regulations, and certification measures.
  • 8. • Vulnerability Management • Create management team • Assess vulnerabilities and risk • Security Awareness and Training • Monitoring and Review • Application Security • Securing development practices • Creating a team to handle data encryption • Securing and assessing data • Access Control and Provisioning • Implement Single Sign on and Multi- factor authentication • Create a training program and access provision team • Analyze patch and vulnerability management 1.Physical and Environmental Security • Gain security • Purchase cameras, motion detectors, and security alarms • Development policies and procedures • Create training classes for employees • Threat Detection & Intelligence Develop threat intelligence prosecutes • Threat intelligence gathering and analysis • Monitoring, analysis, and adaption • Incidence Response • Threat detection and intelligence • Create a team that can understand the nature of the attack • Identify affected systems and create plan to mitigate the damage • Disaster Recovery • Develop disaster recovery team • Create playbook, testing, and exercise plans • Create strategies and procedures • Risk Management • Assess risks • Complete risk assessment • Document and treat risk areas
  • 10. Improvement Program Subtitle • Open the Design Ideas pane for instant slide makeovers. • When we have design ideas, we’ll show them to you right there. The improvement program shows a breakdown over the next 5 years that analyzes which areas need to be improved upon. In each area the operations team will need to track the occurrences, the effects, ownership, resource estimates, due dates, completion, and status. In the span of five years, there should be a decrease in risk in the areas we are worried about in terms of security and compliance.
  • 11. Summary The DDHI Security Operations Plan covers every area DHHI should consider mitigating risks, prevent breaches, reduce threats to information assets, reduce downtime/recovery time and data loss, and ensure compliance at all levels. The approach is created with the intent and understanding of DHHI’s services and information systems. The services are intended to protect the company, employees, clients, and stakeholders. Implementing these facilities will reduce risk, reduce overhead, reduce time, and act as an aid in the recovery and planning of potential attacks that could occur. The cyber security, physical security, and digital security DHHI and the implementation of the above services is critical and crucial to providing a secure environment to DHHI’s staff, contractors, vendors, and clients. These services will contribute to the feeling 11
  • 12. THANK YOU Lauren Campbell Questions? You can reach me at Lcampb45@students.kennesaw.edu 12