INSTRUCTIONS:
This activity will address module outcomes 2 and 3. Upon completion of this activity, you will be able to:Identify methods and means for gathering cyber threat intelligence. (CO4)Synthesize Threat Intelligence and preparedness to improve cyber resilience. (CO4)As you have learned from this course, cybersecurity leadership and communications lies at the epicenter of managing cyber risk. Without effectively assessing and communicating cyber risk, the organization can be lulled into a false sense of security. This can be amplified by beliefs such as “we are not a target”, often voiced by organizations. In reality, in cyberspace, there are no borders and there are no special attributes that mark a target except that they appear vulnerable to attack.Based upon your research and using the material learned from this and prior lessons, you should be able to synthesize these conflicting messages within an organization, identify those that are restricting cyber preparedness and overcome the barriers to adoption and rigorous exercise of cybersecurity best practices to create an organization that is resilient to cyberattack.As an example, here are some sample themes:Bridging the gap between threats and cyber preparednessMeasuring and improving cybersecurity training effectiveness to remain relevant with current threatsPreparing for the worst day everThe paper should include the following information:A title page with the title and paper authorA table of contentsWrite-up of 7 to 10 pages comprising the following sections:An executive summary that introduces the topic to the audience but does not present any conclusionsResearch on the topicConclusion including a recommendation on how this might help address the problem presentedWrite a 7 to 10 page research paper on the issues that should be addressed by a cybersecurity leader that brings together the topics of cyber threat intelligence and cyber resilience. You should fully cite all your sources, using APA guidelines for writing and citations.