For this project, you will leverage your research from Project #1 and analysis from Project #2 to develop a risk mitigation strategy for your chosen company. If necessary, you can adjust your Information Usage Profile or your Risk Profile using feedback from your instructor and additional information from your readings and research. The deliverable for this project will be a Risk Mitigation Strategy that includes a Security Controls Profile based upon the security and privacy controls catalog from NIST SP 800-53 Revision 5 and the security functions and identifiers from the NIST Cybersecurity Framework (CSF)
VII
see attached. CybersecurityPolicies Without Borders This assignment measures your mastery of ULOs 2.1, 2.2, 2.3, 5.3, and 6.2. Unlike countries, the Internet is not confined to specific national borders or geopolitical boundaries defying traditional governance. Perform research in the CSU Online Library and the Internet, and answer the following questions: