Final Project - Assignment
Final Project - Assignment
EXECUTIVE SUMMARY
The increasing threat landscape and the critical need for robust cybersecurity measures have prompted
Guinness to prioritize the development of a technology strategy guideline. This executive summary
provides a high-level overview of the Technology Strategy Guideline, summarizing the key points and
strategy to address cybersecurity and outlines the approach that will be taken using a combination of the
NIST Framework and the CIS 20 Critical Controls. The executive summary concludes by requesting
approval from the Board of Directors to proceed with the implementation of the technology strategy.
The purpose of the Technology Strategy Guideline is to provide a comprehensive roadmap for
Guinness's technology and cybersecurity efforts. The guideline serves as a strategic document that
outlines the organization's vision, goals, and objectives related to technology and cybersecurity. It
provides a framework for assessing the current state, defining the desired future state, and identifying
the necessary steps to bridge the gap. By leveraging the NIST Framework and the CIS 20 Critical
Controls, we will align our cybersecurity efforts with industry best practices and standards, ensuring a
ORGANIZATION
In the past, Guinness has focused on technology as an enabler for growth and operational efficiency.
The organization has implemented various cybersecurity measures, including network firewalls,
antivirus software, and user awareness training. While these efforts have provided a certain level of
protection, there is a need to enhance the organization's resilience and response capabilities. The past
3
vision aimed to establish a secure and reliable technology infrastructure to support business
objectives.
Guinness's future vision for technology and cybersecurity is to become a leader in secure digital
transformation and proactive threat management. The desired state includes a robust and resilient
technology infrastructure leveraging cloud services, advanced threat detection and response
capabilities, and strong security culture. (Bresnahan, 2022). The future vision aligns with the
organization's strategic goals of expanding globally, delivering innovative products, and ensuring
Mission
The future mission of Guinness’s technology and cybersecurity efforts is to safeguard the
organization’s critical assets, ensure business continuity, and enable secure digital transformation.
The technology strategy aims to establish a proactive cybersecurity posture, implement robust
controls, and foster a culture of security awareness and accountability. Specific goals include
achieving compliance with industry regulations, reducing cyber risk exposure, and building trust
Core Values
Guinness's technology and cybersecurity initiatives are guided by the following core values:
solutions.
Integrity - We uphold the highest ethical standards in managing technology and protecting
sensitive information.
GOALS
Develop and deliver cybersecurity awareness training for all employees to promote a culture
Implement a Security Information and Event Management (SIEM) system for centralized log
Strengthen data protection by implementing data loss prevention (DLP) controls and
Conduct regular penetration testing and security audits to identify and address any
vulnerabilities.
Enhance security monitoring and threat intelligence capabilities through the implementation
Implement a formal vendor risk management program to assess and mitigate risks associated
Continuously evaluate and enhance security controls based on lessons learned, industry best
Long-term goals
Develop and implement a business continuity and disaster recovery plan to ensure the timely
Foster strategic partnerships with industry peers, government entities, and information-
Maintain compliance with relevant regulations and standards, adapting to new requirements
as they arise.
Obstacles to achieving the technology strategy goals may include limited budgetary allocations for
personnel or subject matter experts, resistance to change within the organizational culture, evolving
regulatory requirements, and the constantly evolving threat landscape. These obstacles need to be
Benchmarks of Success
To measure the success and effectiveness of the strategy, specific benchmarks have been established.
These benchmarks serve as key performance indicators (KPIs) to track progress, evaluate outcomes,
and ensure the strategy's alignment with organizational goals. Regular monitoring and assessment
will be conducted to measure performance against these benchmarks. Some of the benchmarks
include.
vulnerabilities.
Positive feedback and satisfaction ratings from internal stakeholders and customers
Reduction in the overall cybersecurity risk exposure based on periodic risk assessments.
7
By focusing on these benchmarks, Guinness aims to establish a robust and resilient cybersecurity
posture while leveraging technology to drive innovation and secure its operations. The organization is
committed to continuous improvement and will regularly review and update its technology strategy to
STRATEGY
Guideline as it ensures the availability of the necessary physical, financial, and human resources
identify potential gaps, allocate resources effectively, and ensure the strategy's viability and
Physical Resources - Evaluate the organization's existing physical resources to support the
data centers, and facilities. Assess the capacity, scalability, and reliability of these resources
and identify any gaps or areas that require upgrades or enhancements. Determine if there is a
need for additional physical resources to support new technology initiatives, such as cloud
Financial Resources - Assess the financial resources needed to implement the technology
strategy effectively. This involves evaluating the budgetary requirements for technology
external expertise, and ongoing maintenance costs. Consider the organization's financial
capabilities, projected budget allocation, and potential sources of funding. Develop a detailed
budget that aligns with the strategy's goals and objectives, ensuring adequate financial
resources are available to support the implementation and sustainability of the strategy.
8
Human Resources - Evaluate the organization's current workforce and determine if there are
sufficient human resources with the necessary skills and expertise to execute the technology
management capabilities. Assess the need for additional human resources, such as
acquire, train, or hire the required human resources. Consider factors such as recruiting
planning to ensure the availability of skilled personnel throughout the strategy's lifecycle.
key stakeholders, including employees, executives, customers, partners, regulators, and the
board of directors. Develop strategies to engage stakeholders, gather feedback, and address
their concerns. Ethical considerations should include respecting privacy, data protection, and
compliance with legal and regulatory requirements. Develop a communication plan to keep
strategy.
security breaches. Incident response aims to identify an attack, contain the damage, and
eradicate the root cause of the incident. (Borkar, 2022). Integrating risk management and
incident response considerations into the resource assessment is very crucial. Identify
potential risks, vulnerabilities, and threats associated with the implementation of the
incident response plan. Allocate resources to ensure timely detection, response, and recovery
in the event of a cybersecurity incident. Consider collaborating with internal and external
By conducting a comprehensive resource assessment, Guinness can ensure the availability of physical,
financial, and human resources necessary to support the successful implementation of the technology
strategy. It enables effective resource allocation, minimizes potential gaps or constraints, and ensures the
Implementation Plans
The implementation plan will be divided into phases, each spanning a specific period. Key elements of
Identify gaps and prioritize areas for improvement based on risk analysis.
Develop a detailed project plan, including timelines, milestones, and resource requirements.
Strengthen network security controls, including firewalls, intrusion detection systems, and
Enhance data protection measures, such as encryption and data loss prevention.
Develop and implement policies, procedures, and guidelines for technology and
cybersecurity.
Conduct regular audits and assessments to monitor compliance and identify areas for
improvement.
Conduct regular security awareness campaigns and provide targeted training sessions for
Implement a security monitoring and incident response system to detect and respond to
Conduct regular vulnerability assessments and penetration testing to identify and remediate
vulnerabilities.
Continuously review and enhance security controls and practices based on emerging threats
Incident and Threat Monitoring - Continuously monitor and analyze security incidents,
User Feedback and Surveys - Collect feedback from employees and stakeholders regarding
Compliance Audits and Assessments - Conduct regular audits and assessments to ensure
Lessons Learned Analysis - Analyze past incidents and near-misses to identify areas for
Next Steps
Board Approval - Present the Technology Strategy Guideline to the Board of Directors for
review and approval. Address any questions or concerns raised during the presentation.
understanding.
Resource Allocation - Allocate the necessary physical, financial, and human resources to
support the implementation of the strategy. Review budgetary needs and secure necessary
approvals.
Implementation Monitoring - Establish mechanisms to monitor and track the progress of the
reviewing the strategy, collecting feedback, and incorporating lessons learned into future
iterations.
Review and Update - Schedule periodic reviews of the Technology Strategy Guideline to
assess its effectiveness and relevance. Update the strategy as needed to address evolving
CONCLUSIONS
In summary, the Technology Strategy Guideline outlines a comprehensive plan to address cybersecurity
challenges, enhance technology infrastructure, and support the long-term success of Guinness. The
document covers key areas such as the organization's past and current vision, future vision and mission,
organizational core values, and goals for the short term and long term. It emphasizes the importance of
resource assessment, ethical stakeholder engagement, risk management, incident response, and ongoing
By leveraging the NIST Framework and the CIS 20 Critical Controls, we have developed a robust and
adaptable strategy that aligns with Guinness's unique needs and aspirations. This strategy seeks to
establish a proactive and resilient cybersecurity posture, optimize resource allocation, and foster a
The proposed implementation plan, supported by clear responsibilities, timelines, and budgets, will
guide us in executing the strategy effectively. We will continuously monitor and assess our progress,
using key performance indicators and feedback mechanisms to ensure that we remain on track and make
necessary adjustments.
In conclusion, we are confident that the Technology Strategy Guideline will enable Guinness to
strengthen its technology infrastructure, enhance cybersecurity measures, and position the organization
13
for future growth and success. We remain committed to continuous improvement and adaptation in the
face of evolving threats and technological advancements. By working together and dedicating the
necessary resources, we will achieve our technology and cybersecurity objectives while safeguarding the
APPENDIX
The following matrices outline the semi-complete implementation action plan for the cybersecurity
initiatives and the semi-complete digital strategy implementation action plan matrix detailed in the
guideline. It provides an overview of the key tasks, responsible parties, board role, budget/source,
timelines, and status updates. These matrices serve as a guide for the Board of Directors and
stakeholders of Guinness to understand the broad scope and progress of the implementation efforts.
14
Upgrade network
1 infrastructure Year 1 IT Director Approval IT budget: $50,000 Kick-off meeting - (Q2-2023) In Progress Execute hardware procurement process.
Conduct cybersecurity Training budget: Training program initiated - Develop training materials and schedule
5 awareness training Year 2 HR Manager Review $50,000 (01/04/2024) In Progress sessions for all employees.
Procurement team meeting
Establish vendor risk with stakeholders - Define assessment criteria and incorporate
6 management program Year 2 Procurement Manager Approval IT budget: $300,000 (01/06/2024) Started into vendor onboarding process.
Review and enhance Cybersecurity Controls implementation Conduct gap analysis and prioritize control
7 security controls Year 3 Security Manager Approval budget: $50,000 started - (30/10/2024) Not Started enhancements.
Conduct regular security Review and Audit budget: Monitoring and evaluation Define audit scope and engage external
8 audits and assessments Year 3 Internal Audit Manager Guidance $100,000 plan finalized - (01/01/2025) Not Started auditors if necessary.
16
References
Bleich, C. (2023). 4 Things your Cyber security training for beginners must cover. Edge point learning.
https://www.edgepointlearning.com/blog/cyber-security-training-for-beginners/
https://www.exabeam.com/incident-response/the-three-elements-of-incident-response-plan-
team-and-tools/
Bresnahan, E. (2022). How Digital Transformation impacts IT and Cyber risk programs. Cyber Saint
Security. https://www.cybersaint.io/blog/managing-risk-in-digital-transformation