Answer 5
Answer 5
Name
Instructor
Institutional Affiliation
Date
2
The external context in which the company operates has a significant impact on its
cybersecurity risk and threat landscape. This is because as the company becomes increasingly
interconnected, it becomes more susceptible to cybersecurity threats that originate both within
and beyond the organizational boundaries. With the integration and complexity of firms’
business engagements, they are exposed more to cyber threats that are not bounded by
organizational domain or industry sector (Mallick & Nath, 2024). For example, the growing
nature of cyber threats such as the rise of technical and sophisticated cyber threats including
APTs and state-sponsored cyber espionage calls for the need for the organization to be more
vigilant in protecting its assets against external threats.
Research into best practices and regulatory factors also highlights and supports the idea
that organizations cannot afford to wait for an attack to happen. Instead, organizations should
develop proactive approaches to cybersecurity. The legal and compliance standards that are
inherent in an organization dictate the kind of security that the organization should have in place
to help prevent incidents of cybersecurity breaches. For instance, the General Data Protection
Regulation (GDPR) and the Federal Information Security Management Act (FISMA) enforce
strict security standards that companies must adhere to, influencing their cybersecurity strategies
and practices (Amoo et al., 2024). Policy factors also hold a significant position in influencing
the threats; some of which are governmental policies regarding critical infrastructure and policies
for encouraging the Public-Private Partnership in the realm of cybersecurity.
From my research, I identified several external industry sources and best practices that apply to
this organization. These industry best practices provide a framework for handling and managing
cybersecurity threats. The following are some of the external industry sources and best practices
that I researched.
3
The NIST Cybersecurity Framework offers important cybersecurity best practices that help
organizations to better understand and improve their approaches to managing cybersecurity risks
and threat landscape. The framework is one the most widely adopted and used across different
industries. It also enables organizations to ensure that their approaches to managing
cybersecurity risks align with the underlying and recognized standards for identifying, detecting,
responding to, and recovering from cyberattacks.
The CIS Controls consist of 18 important measures that organizations can use to strengthen their
cybersecurity postures. These controls prioritize activities over roles and device ownership.
Today, many organizations across different industries use CIS Controls to inform their
cybersecurity threat management approaches.
CISA is an important body that regularly issues alerts and advisories regarding current threats,
vulnerabilities, and patches. More pressing, alerts and advisories on current threats,
vulnerabilities, and patches are often released by CISA. They assist in tracking new threats or
other risks that may affect the organization hence allowing modification of the risk assessment
and risk management solutions.
The DBIR provides precise information about the frequencies of data breaches, kinds of attacks,
and weak spots. Having its insights enables one to provide a better risk assessment of the
prevailing threats associated with the industry since it creates awareness of the most common
risks in the specific industry (Amoo et al., 2024).
With the help of Gartner’s assessment and ranking of cybersecurity vendors and solutions, it is
possible to define the major tendencies and prioritize the best practices within the field. Using
this information guarantees that the risk assessment integrates modern instruments and solutions
that increase the efficiency of security mechanisms.
4
References
Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Kaggwa, S., Prisca Ugomma
Uwaoma, Azeez Olanipekun Hassan, & Samuel Onimisi Dawodu. (2023). Review of
strategic alignment: Accounting and cybersecurity for data confidentiality and financial
https://doi.org/10.30574/wjarr.2023.20.3.2691
Mallick, M. A. I., & Nath, R. (2024). Navigating the Cyber Security Landscape: A
Amoo, O. O., Atadoga, A., Osasona, F., Abrahams, T. O., Ayinla, B. S., & Farayola, O. A.