Part 2: Solution ProposalsYou now take the role of a cyber security firm who wants the business of the various organizations seeking help, and will respond to the RFPs from other groups with well-rese

CyberRely Consulting Firm Overview One of the most trusted cybersecurity firms in the industry, CyberRely Consulting is comprised of technology experts specializing in the fields of assets protection, penetration testing, network vulnerability testing, risk and control assessments, network security, and cyber threat detection and management. With a skilled workforce operating in technology centers located around the globe, CyberRely Consulting has offered technical services and solutions to hundreds of customers. Considering the rapidly growing expansion of the technology busin ess, CyberRely Consulting has become a fundamental leader in the development of effective safeguarding services and comprehensive cyber threat risk control and mitigation plans. Furthermore, CyberRely Consulting has been continuously recognized for maintai ning a loyal client base, who value the transparency and efficacious services offered by the firm. CyberRely Consulting’s proposal should be recommended for acceptance because of the firm’s expertise and reliability. Having certified technolog y professionals with 12+ years of expertise specifically in the fields of penetration testing, vulnerabilities assessment, and cyber threat detection and management operations, CyberRely Consulting is well qualified to address and resolve the cybersecurity issues facing the organization . Additionally, CyberRely Consulting is reliable and unique from other firms in that because the firm operates on a global scale, they have teams working across various geographical locations. Thus, the firm not only has a b roader knowledge of understanding about a diverse base of customer needs, but they are also available to provide 24/7 assistance to customers located anywhere in the world whether it be by speaking with a live representative by phone or virtually through v ideo meetings. Standards One of the most important laws to integrate into organizations is the Cyber Security Enhancement Act of 2014 which provides ongoing public -private partnerships aimed at improving cyber security. Technology Recommendations It is highly recommended for the company to upgrade to the la test operatin g sy stems which introduce advanced multi -layer security against threats with a f lexible application platform. Additionally, CyberRely Consulting would recommend an application -level gateway to filter packets into and out of the network reporting malicious activities. Cybersecurity Assessment A system for firewall configuration we w ill implement is Nessus. It is one of the best security scanning utilities. It inspects firewalls and detects vulnerabilities and malware in the system with real time information. Nessus will shield you from malicious software component s entering and also stopping them from exiting your application system. We recommend Nessus because it can do scheduled scans daily, weekly, or monthly. For network configuration, we recommend the ManageEngine Network Configuration Manager which provides a set of tools for service monitoring, configurations in routers, firewalls, switches and dashboard. They run constant sweeps to identify breaches of devices and networks and reports on all configurations. One tool that is very useful is if a device or netw ork is hacked or compromised, it will be suspended until we approach the problem. There is a free version but limited tools. The more tools needed and required, the higher level will be best recommended. Upon the release of NIST Cybersecurity Framework version 2.0, we advise you to update to the newest version so you can have the latest protection procedures for your company. To find internal and external vulnerabilities, we must allow penetration to have minimum to no risks of threats. W e recommend Intruders which are automated penetration testings that find weaknesses in your systems. They run online automatically which sometimes they are given the name of vulnerability scanners. They find vulnerabilities in your system soon after they are disclosed such as in firewalls or access lists. Other vulnerabilities include web -layered security problems, infrastructure weaknesses , and security misconfigurations. Intruders offers a year round protection that can conveniently run the scanners at any time. All around, Intruders is simple and easy to use for your penetration and vulnerability testing needs. Cost CyberRely Consulting is made up of an efficient team of IT experts with experience in asset protection, penetration testing, risk and contr ol analysis, network security, and cyber threat management. The team at CyberRely Consulting may need additional funding for the services we are willing to provide . Appending to the service, it is recommended to also add MDR (Managed Detection And Response Solutions) to assist in overcoming cybersecurity difficulties such a lack of resources, raising risk awareness, enhancing their capacity to find and respond to attacks, etc. An overall of our service is listed below: SecurityHQ $ 2,025,000 ● Detect and Response ❖ Managed Detection and Response (MDR) ❖ Managed Extended Detection & Response (XDR) ❖ Managed Endpoint Detection and Response (EDR) ❖ ManageEngine Network Configuration Manager ❖ Network Flow Analytics ❖ User Behaviour Analytics ● Ma nage Security ❖ Managed FireWall ➢ Nessus ❖ Managed Endpoint Protection (EPP) ❖ Managed Endpoint Security (Powered by SentinelOne) ❖ Threat & Risk Intelligence (TRI) ● Cyber Risk Management ❖ Penetration Testing Service ❖ Vulnerability Management as a Service (VMaaS) ➢ Intruders ❖ Cyber Security Controls Assessment ❖ Phishing Attack Simulation Full Time Employee: 25 Senior SOC analyst $1,750,000 10 Junior SOC analyst $1,200,000 Annual training $650,000 Operational Expense s: Product implementation & maintenance $350,000 TOTAL: 5,975,000 Our proposal in using SecurityHQ s an easy, all -in-one packet, ready to use, high quality service for resolving and protecting organization's assets including intellec tual property, personnel data, business systems, and brand integrity. As part of SecurityHQ, our service will include maintenance in doing updates, upgrades, record keeping, storage capacity and many more.