Part 2: Solution ProposalsYou now take the role of a cyber security firm who wants the business of the various organizations seeking help, and will respond to the RFPs from other groups with well-rese

Summary NIST is pleased to propose to bid for th is project . NIST offers a robust cybersecurity solution and project management to help the organization maintain existing technology and pr otect against the newest vulnerabilities. Our solution highlights five objectives which are to monitor, prevent, investigate, and respond to cyber security threats within the industry. Additionally, NIST offers a robust cyber security framework, aka NIST F ramework, which details the requirements to deploy and maintain crucial technologies necessary for your operation. All solutions implemented will have accessible backup and logging solutions for administration to interact and use in the event of catastroph e. About Us We are a non -regulatory agency of a physical sciences laboratory. Our mission is to promote American innovation and industrial competitiveness. We develop cybersecurity standards, guidelines, best practices, and other resources to meet the need s of U.S. industry, federal agencies and the broader public. We contribute and focus on areas such as cryptography, education and workforce, emerging technologies, risk management, identity and access management, measurements, privacy, trustworthy networks and trustworthy platforms. Standards We’ve provided our own standards that will enhance but won’t replace cybersecurity standards and industry guidelines that the organization is embracing. This will provide a voluntary, risk -based approach for managing cybersecurity activities and reducing cyber risk . Worst ca se scenario, you can always report any threats and incidents to the FBI. Our team focuses on 3 key components: Profile, Core, Tiers Core is broken down into five categories: Identify, Protect, Detect, Respond, Recover. Identify: Develop an organizational u nderstanding to manage cybersecurity risk to: systems, assets, data, and capabilities. Protect: Develop and implement the appropriate safeguards to ensure delivery of services. Detect: Develop and implement the appropriate activities to identify the occurr ence of a cybersecurity event. Respond: Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. Recover: Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cyber -security event. Technology Recommendation Regulators recommend running the latest firmware and version of any technology, NIST is breaking down most commonly used technology used as well as the ver sion it’s using: Cybersecurity Assessment The following assessments will be performed to discover vulnerability within the organization ● Hardware Assessment ● Network Security Assessment ● Ransomware Vulnerability Assessment ● Cloud Security Assessment ● Third Party Application Assessment ● Incident Response Readiness ● Access Control Assessment ● Penetration Testing Cost Pricing is based on the expected hours of work performed by our own engineers, additional training towards your employee is included in the fee.