CBS & Logistics Emo
CBS & Logistics Emo
Introduction
B. Impact Assessment
Integrity: Ensuring the accuracy and reliability of data throughout our logistics
processes.
Availability: Assessing the potential disruption or downtime that could occur due to a
cyber incident.
Confidentiality: Gauging the risk of unauthorized access to sensitive information within
our logistics systems.
1
Ponemon. The Aftermath of a Data Breach: Consumer Sentiment. Ponemom Institute, Trevose City, MI, 2014.
Available online at https://www.ponemon.org/local/upload/file/Consumer%20Study%20on%20Aftermath
%20 of%20a%20Breach%20FINAL%202.pdf.
[Type here]
Evaluate Recent Incidents: Examine any recent cyberattacks to determine how well our
response procedures are working and where we may make changes.
Gather Feedback from Users: Employees who often deal with our cyber security
measures should be asked for feedback in order to identify any potential weaknesses or
areas of concern.
Benchmark Against Industry Standards: To make sure we stay at the forefront of
cyber defense, there will be comparison of our present cyber security measures to
industry standards and best practices.
V. Implementation Plan
A. Phased Approach
Phase 1: Assessment and Planning: Make a thorough evaluation of the current
infrastructure and create a thorough plan for putting improved cyber security measures
into place.
Phase 2: Encryption Implementation: Give top priority to implementing sophisticated
encryption methods, with an emphasis on data-at-rest and end-to-end encryption.
Phase 3: Access Control Strengthening: Implement enhanced role-based access control
(RBAC) and multi-factor authentication (MFA) procedures together with access controls
and authentication procedures.
Phase 4: Employee Training Programs: Initiate and carry out staff training initiatives
to
[Type here]
guarantee that every employee is knowledgeable about cyber security best practices.
B. Timeline
Phase 1: Assessment and Planning (Month 1-2) Phase 2: Encryption Implementation (Month
3-4) Phase 3: Access Control Strengthening (Month 5-6) Phase 4: Employee Training
Programs (Month 7-8).
[Type here]
Internal Memos and Updates: Send out internal memos and updates on a regular basis
to update the team on the implementation plan's status, impending modifications, and the
reasons behind them.
Feedback Mechanism: Provide a feedback mechanism for staff members to voice
questions or concerns about the new security measures, such as forums or channels
specifically designated for this purpose.
B. External Communication
Client Notifications: Inform partners and clients of the impending improvements to our
cyber security protocols, emphasizing our dedication to the protection of their
information and transactions.
Public Statements: Make public declarations about our commitment to upholding the
strictest guidelines for cyber security through press releases or other appropriate
platforms.
Social Media Presence: Use social media to spread the word about the latest
improvements, demonstrating our proactive stance on cyber security.
B. Crisis Communication
Designated Spokespersons: During a cyber security crisis, appoint essential personnel to
serve as official spokespersons, guaranteeing a steady and precise flow of information.
Timely Updates: Inform internal and external stakeholders as soon as possible about the
occurrence, the actions being taken to resolve it, and any possible effects on operations.
Media Relations: Manage external communications in concert with media relations
experts, making sure that correct information is shared and stopping the spread of false
information.
Conclusion
New techniques for embedding malware in networks, staying undetected for extended periods of
time, stealing data, and upsetting crucial systems are being developed by skilled hackers and
developed by readily accessible shared techniques (Counter-measures Assessment & Security
[Type here]
Experts, LLC, and Western Management and Consulting, LLC, 2020) 2. Only 4 out of 10
respondents in the public sector expressed extreme confidence in their team's capacity to counter
the dynamic threats of today (SolarWinds, 2020)3. To keep networks secure, a new way of
operating is required. It will necessitate behavioral adjustments as well as novel approaches of
confirming asset and data access (Ching, 2021)4.
References
Ching, TM. 5 Key Trends That Will Impact Cyber Security in 2021. DXC on Security, January 8, 2021. DXC
Technology, Tyson, VA. Available online at https://blogs.dxc.technology/2021/01/08/5-key-trends-that-
will-impact-cyber-security-in-2021/.
Countermeasures Assessment & Security Experts, LLC, and Western Management and Consulting, LLC. NCHRP
Research Report 930: Update of Security 101: A Physical Security and Cybersecurity Primer for
Transportation Agencies. Transportation Research Board, Washington, D.C., 2020. Accessed December
2023.
Description of Cyber Security in organizations. https://www.bombessays.com/description-ofcyber-security-in-
organizations/ Retrieved 5 December 2023
Ponemon. The Aftermath of a Data Breach: Consumer Sentiment. Ponemom Institute, Trevose City, MI, 2014.
Available online at https://www.ponemon.org/local/upload/file/Consumer%20Study%20on%20Aftermath
%20 of%20a%20Breach%20FINAL%202.pdf.
SolarWinds. Public Sector Cybersecurity Survey Report. SolarWinds Government, February 2020. Austin, TX.
Available online at https://www.solarwinds.com/resources/survey/solarwinds-public-sector-cybersecurity-
survey-report-2020
Sugar Chan, Eitan Yehuda, Russell Schaefer, Alain Schneuwly, Sharon Zicherman, Stefan Deutscher, and or Klie.
Navigating Rising Cyber Risks in Transportation and Logistics. 2021.
Taneja M., 2013. An Analytics Framework to Detect Compromised IOT Devices Using Mobility Behaviour. In ICT
Convergence (ICTC) on. IEEE, 38–43.
2
Countermeasures Assessment & Security Experts, LLC, and Western Management and Consulting, LLC. NCHRP
Research Report 930: Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation
Agencies. Transportation Research Board, Washington, D.C., 2020. Accessed December 2023.
3
SolarWinds. Public Sector Cybersecurity Survey Report. SolarWinds Government, February 2020. Austin, TX.
Available online at https://www.solarwinds.com/resources/survey/solarwinds-public-sector-cybersecurity-survey-
report-2020
4
Ching, TM. 5 Key Trends That Will Impact Cyber Security in 2021. DXC on Security, January 8, 2021. DXC
Technology, Tyson, VA. Available online at https://blogs.dxc.technology/2021/01/08/5-key-trends-that-will-impact-
cyber-security-in-2021/.
[Type here]