Data Loss Prevention

Data Loss Prevention Scenario
Wonderful news. The executive team of your media company has recognized the importance of cybersecurity
and has promoted everyone in your group into the role of a chief information security officer, or CISO, for your
respective subsidiary.
The company’s executive leadership team has tasked your team to plan the future of mass connectivity and data
loss prevention technology for the company. You and your teammates will compile a technology strategy plan
for incorporating IPv6, internet of things (IoT), and data loss prevention techniques—specifically blockchain,
tokenization, data masking, data obfuscation, and other similar emerging technologies.
You will present this future technology road map and vision to the executive leadership. Your team will have
about five members. In addition to the future technology road map and vision, your team will prepare a future
view of the data flow of your enterprise network.
Your team discussions should be guided by your learning achieved through the other projects in this course.
Your team will compile all the information into one cohesive report—the strategic technology plan for data loss
prevention—to be presented to the executive team. Your team will also prepare an executive presentation
explaining the highlights of your team’s plan.
The world of technology is changing at an unprecedented pace, and these changes represent business
opportunities as well as challenges. Mass connectivity and faster speeds create opportunities for businesses to
network more devices, complete more transactions, and enhance transaction quality. Internet Protocol version 6
(IPv6) and internet of things (IoT) are two such technologies that represent significant opportunities for strategic
cybersecurity technology professionals to create lasting value for their organizations.
IoT is the phenomenon of connecting devices used in everyday life. It provides an interactive environment of
human users and a myriad of devices in a global information highway, always on and always able to provide
information. IoT connections happen among many types of devices—sensors, embedded technologies,
machines, appliances, smartphones—all connected through wired and wireless networks.
Cloud architectures such as software as a service have further enabled big data analytics and improvement in
areas such as automated manufacturing. Data and real-time analytics are now available to workers through
wearables and mobile devices.
Such pervasive proliferation of IoT devices gives hackers avenues to gain access to personal data and financial
information and increases the complexity of data protection. Given the increased risks of data breaches, newer
techniques in data loss prevention should be examined.
Increased bandwidth and increased levels of interconnectivity have allowed data to become dispersed, creating

issues for big data integrity. In such a world, even the financial transactions of the future are likely to be different
—digital currencies such as Bitcoin may be used for some future financial transactions.
To survive and thrive, organizational technology strategists must develop appropriate technology road maps.
These strategists must consider appropriate function, protection, and tamper-proofing of these new
communications and transactions.
It will be impossible to protect data by merely concentrating on protecting repositories such as networks or
endpoints. Cybersecurity strategists have to concentrate on protecting the data themselves. They will need to
ensure that the data are protected no matter where they reside.
In this project, you will work with team members to compile a technology strategy plan for your organization to
protect data throughout the company. This project will take about two weeks to complete. There are 10 steps in
the project, which will include a 12- to 15-page report, slide presentation, and lab report.

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>