Skip to main content

Implement Organizational Cyber Defenses

Learning Objectives

After completing this unit, you’ll be able to:

  • Describe ways organizations can guard against cybercrime.
  • Use cyberdefense practices for various key events.

In today’s digital era, the responsibility of safeguarding information extends beyond individual cyber awareness and into a broader, more focused and collaborative organizational approach.

This unit is dedicated to equipping organizations with the knowledge and tools necessary to work towards mitigating cyber risk, but first, let’s revisit what you learned in the previous unit regarding individual protective measures during key cyber events.

Practice Cyber Vigilance

Let’s practice using real-world scenarios that will prompt us to think critically about our actions and decision-making.

The following knowledge check isn’t scored—it’s just an easy way to quiz yourself. To get started, click the play icon and select the correct answer in the scenario listed then click Submit to check your work. If you answered incorrectly, you’ll be provided with feedback and you can click, Try Again to give it another shot. Once you’ve answered the question correctly, you can click Next to move to another scenario. There are four in total.

How did you do? By practicing secure decision-making individuals and organizations can significantly enhance their cybersecurity posture in an increasingly digital world.

Organizational Preparedness for Key Cyber Events

Organizations, be they small enterprises or large corporations, function not just as standalone entities but as integral parts of a larger, interconnected digital ecosystem. This interconnectedness, while beneficial, also exposes them to a myriad of cyber risks that can have far-reaching consequences. Understanding these risks, preparing for them, and responding effectively are no longer optional but essential components of organizational strategy.

This table provides a succinct-yet-comprehensive overview of an organization’s potential communication plan, outlining the key actions, channels, and details for each stage of communication before, during, and after a global key event–the holiday season.

Communication Plan Objective: Educate stakeholders about heightened cybersecurity risks during the holiday season.

Target Audience: Employees, Management, IT Team, External Partners

Key Messages: 

  1. Increase in cyberthreats during the holiday season.
  2. Importance of vigilance and following security protocols.
  3. Immediate reporting of suspicious activities.

Responsibility: The campaign will be led by the cybersecurity team, with support from Marketing and HR for communications and distribution.

Stage 

The time frame/phase within the campaign

Action 

The high-level tactic to achieve the campaign objective

Channel 

The media used to carry out/communicate the action

Details 

Specific information regarding the actions taken to inform/educate employees and stakeholders at each stage

Initial Planning 

Plan announcement

Email and intranet

  • Send a strategy announcement, from the CEO, via company-wide email.
  • Share an intranet post outlining the plan’s key objectives and timeline.

Awareness Building 

Educational sessions and interactive learning

Webinars and intranet Quizzes

  • Host daily webinars on different cyberthreats (phishing tactics in holiday-themed emails, safe online shopping practices, password safety).
  • Send an interactive quiz to practice cyberthreat recognition.
  • Conduct phishing tests.

Continuous Engagement 

Weekly engagement and support activities

Email Updates, Compliance Spaces, Meetings

  • Send weekly thematic emails (for example, “Holiday Scam Alerts”), accompanied by virtual cybersecurity “popup” posters to share secure holiday tips.
  • Conduct open hours with IT and Cybersecurity for personalized questions and support.

Evaluation and Feedback 

Feedback collection and sharing

Closing Webinar and Email Survey

  • Organize a closing webinar to summarize the campaign impact and share success stories of real incidents identified and averted.
  • Distribute feedback surveys via email.

Post-Campaign Analysis 

Campaign review

Internal Review Meeting

  • Review engagement metrics, feedback survey results, and incident reports to assess the campaign’s effectiveness and lessons learned.
  • Discuss and plan improvements for future campaigns.

 

This sample communication plan adopts a strategic and phased approach to cybersecurity communication tailored specifically for the holiday season. Its comprehensive structure aims to educate and influence the behaviors of employees and stakeholders during the high-risk holiday period.

Organizations can use this plan as a template to inform other plans that are specific to the high-risk events discussed previously. These plans should also account for special or uncommon occurrences. For example, significant corporate mergers or acquisitions, or in the wake of a large-scale data breach.

In such scenarios, the organization must quickly communicate risks to increase awareness, reinforce security protocols, and maintain stakeholder trust. This approach ensures preparedness for various cybersecurity challenges across different critical periods and unique situations. 

Private-Public Partnerships 

Organizations can further strengthen their preparedness for cyber events that historically attract cybercriminals through private-public partnerships, which can play a pivotal role in enhancing cyber vigilance among employees and other stakeholders.

Here's how these collaborations can be leveraged.

Collaboration with Law Enforcement and Cybersecurity Agencies 

  • Information Sharing: Organizations can collaborate with law enforcement and cybersecurity agencies to share intelligence about emerging threats. This cooperation can lead to a better understanding of the threat landscape and more effective response strategies.
  • Joint Training Sessions: Hosting joint training sessions with cybersecurity experts from public agencies can provide employees with insights into the latest threats and defense mechanisms.

Partnering with Cybersecurity Firms 

  • Regular Security Audits: Engaging with cybersecurity firms for regular security audits can help identify vulnerabilities in the organization’s digital infrastructure. These audits can be tailored to focus on periods of increased cyber activities, such as tax season or holiday shopping.
  • Advanced Threat Detection Tools: Implementing advanced threat detection tools developed by cybersecurity firms can provide real-time alerts and mitigate risks more effectively. 

Educational Initiatives with Academic Institutions 

  • Research and Development: Collaborating with universities for research and development in the field of cybersecurity can lead to innovative solutions tailored to specific cyber events.
  • Cybersecurity Workshops and Seminars: Partnering with academic institutions to conduct workshops and seminars can help in disseminating knowledge about cybersecurity best practices.

Policy Advocacy and Cybersecurity Legislation 

  • Advocating for Stronger Cybersecurity Laws: Organizations can collaborate with government bodies to advocate for stronger cybersecurity legislation, which in turn helps in creating a more secure digital ecosystem.
  • Guideline Development: Participating in the development of industry-wide cybersecurity guidelines can standardize responses to cyberthreats and foster a culture of security.

By adopting these comprehensive measures and integrating them into the existing cybersecurity communication plan, organizations can significantly enhance their preparedness for major cyber risk scenarios. Such an approach not only educates employees and stakeholders but also contributes to building a more resilient and informed community that can effectively counter cyberthreats.

Sum It Up

In this module, you’ve explored the potential cyber risks associated with key global events and how you and organizations can be vigilant and employ digital security best practices during times you may be most vulnerable.

Interested in learning more about cybersecurity roles and hearing from security professionals? Check out the Cybersecurity Career Path on Trailhead. 

Resources

Share your Trailhead feedback over on Salesforce Help.

We'd love to hear about your experience with Trailhead - you can now access the new feedback form anytime from the Salesforce Help site.

Learn More Continue to Share Feedback