100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

Cybersecurity Management - WGU D489 Task 1, passed first submission

Rating
-
Sold
-
Pages
35
Uploaded on
04-08-2025
Written in
2025/2026

Cybersecurity Management - D489 Task 1, passed first submission












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 4, 2025
Number of pages
35
Written in
2025/2026
Type
Other
Person
Unknown

Subjects

Content preview

Cybersecurity Management - D489 Task 1 passed first submission




Cybersecurity Management - D489



Western Governors

University Flex

Vaughn




Cybersecurity Management - D489 Task 1 passed first submission

,Cybersecurity Management - D489 Task 1 passed first submission




A. Summarize the gaps that exist currently in the company’s security framework
as described in the attached “Independent Security Report.”


The gaps that currently exist in the company’s security framework are as follows

Lack of alignment with security best practices and industry standards:

The company’s security program lacks an approach that covers securing and

protecting organizational assets, Security of Payment Card data and privacy

protection for customers located in the European Union. SAGE books lack policy

elements that outline acceptable use, mobile device poly, secure passwords etc.

The company also processes card payments and should be abiding by the PCI DSS

Standard requirements but SAGE books does not have any documentation stating

that they are following these standards or accept these payments in accordance

with PCI DSS. Finally, SAGE does not currently have any specific measures to protect

the collection, storage and use of data of their customers in the European Union as

outlined in the GDPR.

Understaffed security team:

SAGE books currently has a security team that meets operational security

goals but they do not have a sufficient Governance Risk and Compliance team. This

could lead to a lapse in compliance in regulations such as GDPR, FISMA or PCI DSS,

which could then lead to lawsuits and sanctions.

Inadequate cybersecurity awareness program:

The current cybersecurity awareness training is Ad Hoc meaning, on an as

needed basis. Furthermore, only a quarter of new hires and only 10% of current

employees took the training. The training content also does not meet

requirements outlined in best practices or standards.




Cybersecurity Management - D489 Task 1 passed first submission

,Cybersecurity Management - D489 Task 1 passed first submission




Incomplete incident response plan (IRP):

SAGE’s IRP deviates from best practices by lacking clear roles and

responsibilities for incident response team members and inadequate procedures

for incident handling and analysis. With this deviation, SAGE puts its information

assets at risk and leaves the company at risk for prolonged security threats and

attacks.

Absence of a Business Continuity Plan (BCP):

The report highlights the critical need for a BCP that outlines recovery

procedures for restoring operational capability in the event of disruption. Given

SAGE Book’s location of distribution centers, they are at a higher risk of natural

disaster interruptions.



B. Develop mitigation strategies to address the gaps identified in the “Independent

Security Report,” ensuring compliance with PCI DSS and GDPR.

To address the security gaps identified in the "Independent Security Report" and

ensure compliance with PCI DSS and GDPR, SAGE Books should implement the

following mitigation strategies:

Enhance Security Policies and Procedures

1.) Create policies to fill gaps in securing and protecting organizational assets:

Create formal policies for acceptable use, mobile device security, secure

password creation and management, and protecting personally

identifiable information (PII) contained on organizational assets. SAGE

Book’s should base these policies on regulatory guidelines from NIST and

security best practices outlined in the PCI DSS.

2.) Align existing policies with industry standards and best practices: Update the

cybersecurity awareness training program to meet NIST standards and PCI

DSS Requirement 12.6. SAGE should also align the incident response plan

Cybersecurity Management - D489 Task 1 passed first submission

, Cybersecurity Management - D489 Task 1 passed first submission




(IRP) with NIST Special Publication (SP) 800-61 Revision 2 to enhance

incident response capabilities.




Cybersecurity Management - D489 Task 1 passed first submission

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Boffin Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1762
Member since
4 year
Number of followers
1469
Documents
7146
Last sold
15 hours ago
Pilot Study

Prevent resits and get higher grades.

3.8

433 reviews

5
209
4
74
3
70
2
16
1
64

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions