Recovering from A Cyber Attack Discussion
Description
DB 5:
It is time to assess the event, our company’s preparation for it, and the way the government and our company interacted before, during and after the event. In your post, answer the question below and focus on ways in which Worldwide Global, Inc. should move forward in recovering from this cyber event.
How can Worldwide Global, Inc. clean up its image for internal and external audiences after a situation like this and regain the trust?
What role can the government play in ensuring that companies like ours emerge from an attack like this in the strongest possible position?
As you discuss this question in your discussion post, please address some of the following related questions:
What happened? How did Worldwide Global, Inc. fall short? How did the government perform?
How can Worldwide Global, Inc. repair the damage done to relationships with internal and external audiences?
Internally, how can Worldwide Global, Inc. retain our employees? How can Worldwide Global, Inc. reassure them when there have been layoffs and the company has experienced significant financial losses?
Externally, how should Worldwide Global, Inc. go about regaining our customers#onfidence? How can Worldwide Global, Inc. get those who may have left us to come back? How does this impact new business in the future?
What does the government and Worldwide Global, Inc. need to change?
How should another organization properly arm or prepare for a situation like this cyber event?
DB 6-
There are additional questions we must ask as we assess this incident. In your post, answer the question below and focus on ways in which Worldwide Global, Inc. and the government should move forward?
How can Worldwide Global improve training programs so that they are better prepared for a cyber attack in the future?
As you discuss this question in your discussion post, please address some of the following related questions:
What types of training programs could we implement to ensure all of our people are better prepared?
What should a company like ours expect from the government in help in the area of training? What should a company like ours expect from ISACs (information sharing and analysis centers)?
How often should this training be provided? Should it be mandatory?
What should be the training process for new employees prior to them accessing the information system?
How else can we use training to ensure that our people understand Cyber security roles and responsibilities, password procedures and requirements, and in/formal policies pertaining to removable storage devices?
Finally, as we wrap-up the virtual tabletop exercise, letàdo a quick hotwash. We¥ all now dedicated several hours to this, and I think we¥ uncovered some really important insights. So I love your help in answering one final key question. Remember, by sharing, we have the opportunity to not only help ourselves be more prepared, but also to impact changes that will improve the entire nationàresiliency.
What lessons did you learn from the virtual tableTop exercise that you would like to share with others?

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."