For this assignment, you will categorize the content in open sources such as MITRE ATT&CK and its implications plus options & their “Groups,” the Verizon DBIR, CISCO Cyberthreat reports, Cisco Talos, Crowdstrike, DHS’s CISA advisories, and other leading quality Internet sources. Add peer-reviewed research literature to select current insights published within the last 2 years.
In your assignment, be sure to address the following:
A formal paper is suitable for delivery to the CIO and CISO and their teams of your specified organization. You should act as a consultant (internal or external to the organization) in formulating your response. Add no less than one table beyond the narrative content provided above.
Length: 6 pages, not including title and reference pages, include at least one table
References: Include a minimum of 6 scholarly references. You can cite 4 from the course, but also cite at least 2 different peer-reviewed academic research studies relevant to your approach for this assignment. These specified references should not be in this course and have been published in the last two years.
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards, and include a plagiarism report.