After reviewing Breach Analysis Simulation Scenario Two(uploaded with the question), address the critical elements below:
I. Reporting: Select an audience for reporting (sales team, senior management, or other stakeholders).
A. Explain how you report technical concerns to non-technical people in your selected audience. Keep in mind that most managerial roles are non-technical in nature; managers need information presented to them in a format they can easily understand and use.
II. Subcontrols: Refer to the CIS Controls worksheet used in Breach Analysis Simulation Scenario Two and recommend two additional subcontrols that could be modified either by policy, implementation, automation, or reporting to enhance security for the organization.
A. Subcontrol One: Describe the modification of the subcontrol and justify your recommendation.
B. Subcontrol Two: Describe the modification of the subcontrol and justify your recommendation.
III. Two-Factor Authentication: A proposed solution for the breach issue is to use RSA key fobs as a means of two-factor authentication.
A. Discuss the merits of using RSA encryption and the implementation of two-factor authentication.
B. Discuss how different forms of encryption may be used in VPN software.
Guidelines for Submission: Your submission should be one to two pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited using APA format.