Quote Control Ltd - Cyber Security Project

Closed
Quote Control Ltd.
Brampton, Ontario, Canada
Chief Operating Officer
(5)
4
Project
Academic experience
300 hours per learner
Learner
Canada
Intermediate level

Project scope

Categories
Security (cybersecurity and IT security) Information technology
Skills
incident response cyber security incident reporting vulnerability
Details

The main goal of this project is to develop and implement a robust cybersecurity framework for a Tech Start Up that will provide a trusted environment for future clients of our products.


Quote Control Ltd. works with small to medium sized enterprise Shippers and Freight Forwarders to reduce errors and streamline communications up front, enabling them to execute the first time.


Our Vision: Is to enable small to medium logistics operators to compete on a global scale by giving them access to technology typically only available to large multinationals.


Our Mission: We are fostering the evolution of logistics with innovative technologies that enhance efficiency, optimize performance, and maximize yield.



We are very early and working on our MVP. We have alot of ideas and want to be able to offer products people can trust with their most confidential information. Right now, we are an open book. Start right, Stay right is the motto of the day for Cyber Security as it is moving and evolving faster than we can keep up to it. We need a Framework to manage, monitor and upgrade security measures for the protection of Quote Control Ltd.'s data, systems and networks as we evolve them.



Deliverables

This is what CHAT GPT is telling me (and my generalist perspective suggests it is a good start).

Specific Tasks for Learners (Governance and Procedures)

Learner 1: Project Management and Documentation

  • Total Hours: 60
  • Responsibilities:
  1. Project Planning and Coordination (10 hours)
  • Develop project timeline and task allocation.
  • Conduct daily stand-up meetings to track progress.
  1. Documentation (20 hours)
  • Document requirements, design decisions, and architecture.
  • Create user guides and system manuals.
  1. Quality Assurance and Review (10 hours)
  • Review documents and policies for adherence to standards.
  • Perform peer reviews and provide feedback.
  1. Final Presentation Preparation (10 hours)
  • Prepare the final project report and presentation materials.
  1. Meeting Coordination (10 hours)
  • Schedule and coordinate meetings with stakeholders and mentors.

Learner 2: Governance Framework

  • Total Hours: 60
  • Responsibilities:
  1. Develop Security Policies (15 hours)
  • Create comprehensive security policies based on industry standards (e.g., NIST, ISO 27001).
  1. Establish Procedures (15 hours)
  • Define procedures for incident response, access management, data handling, and encryption.
  1. Compliance and Regulatory Requirements (10 hours)
  • Research and document applicable regulations (e.g., GDPR, CCPA).
  • Create a compliance checklist.
  1. Risk Management Framework (10 hours)
  • Develop a risk assessment and management framework.
  • Identify and document potential risks and mitigation strategies.
  1. Policy Review and Approval (10 hours)
  • Review policies with stakeholders and incorporate feedback.

Learner 3: Security Architecture Design

  • Total Hours: 60
  • Responsibilities:
  1. Define Security Requirements (10 hours)
  • Identify and document security requirements for the email plugin service.
  1. Design Identity and Access Management (IAM) (15 hours)
  • Develop an IAM framework, including authentication and authorization mechanisms.
  • Define roles and permissions.
  1. Data Protection Strategy (15 hours)
  • Develop a data protection strategy, including encryption protocols and data retention policies.
  1. Network Security Design (10 hours)
  • Design a network security framework, including firewalls, VPN, and intrusion detection systems.
  1. Create Security Architecture Diagrams (10 hours)
  • Develop detailed security architecture diagrams.

Learner 4: Incident Response and Monitoring

  • Total Hours: 60
  • Responsibilities:
  1. Incident Response Plan (15 hours)
  • Develop an incident response plan with defined roles and procedures.
  1. Monitoring and Logging Strategy (15 hours)
  • Define a strategy for monitoring and logging activities.
  • Identify key metrics and logging requirements.
  1. SIEM Recommendations (10 hours)
  • Research and recommend Security Information and Event Management (SIEM) tools.
  • Define SIEM implementation guidelines.
  1. Incident Response Testing (10 hours)
  • Develop procedures for regular testing of the incident response plan.
  • Create a schedule and plan for conducting tabletop exercises.
  1. Documentation and Training (10 hours)
  • Document incident response procedures.
  • Develop training materials for incident response team.

Learner 5: Application Security and Best Practices

  • Total Hours: 60
  • Responsibilities:
  1. Secure Development Guidelines (15 hours)
  • Develop secure coding guidelines and best practices for developers.
  1. Security Testing Procedures (15 hours)
  • Define procedures for security testing (e.g., code reviews, penetration testing).
  1. Vulnerability Management (10 hours)
  • Establish a vulnerability management process, including regular scans and patch management.
  1. CI/CD Security Integration (10 hours)
  • Define security integration points in the CI/CD pipeline.
  1. Application Security Documentation (10 hours)
  • Document application security guidelines and procedures.

Daily Task Allocation (Over 20 Days)

Each learner has approximately 3 hours per day to complete their tasks. Here’s a suggested daily schedule:

  1. Day 1-3: Initial setup, requirement gathering, and planning.
  2. Day 4-10: Core policy development and framework design.
  3. Day 11-15: Detailed procedures and strategy creation.
  4. Day 16-18: Review, testing plans, and stakeholder feedback incorporation.
  5. Day 19-20: Final documentation, training materials, and presentation preparation.

Collaboration and Tools

  • Communication: Use Slack or Microsoft Teams for daily updates and collaboration.
  • Project Management: Use Trello or Asana to track tasks and progress.
  • Documentation: Use Google Docs or Confluence for collaborative documentation.
  • Version Control: Use GitHub or GitLab for document versioning and collaboration.

Learning Objectives for Students

  1. Understanding Security Governance
  • Learn to develop comprehensive security policies and procedures.
  1. Compliance and Risk Management
  • Gain knowledge of compliance requirements and risk management frameworks.
  1. Security Architecture Design
  • Understand how to design a secure architecture framework.
  1. Incident Response Planning
  • Learn to develop and test incident response plans.
  1. Application Security Best Practices
  • Develop secure coding practices and integrate security into the development lifecycle.

By focusing on governance, procedures, and recommendations, learners will gain a deep understanding of the foundational elements required to build and maintain a secure infrastructure for the email plugin service.

Mentorship

A walk through of the product, mentorship time with our leadership team and overall supervision.


We will share everything we know currently about our future Data Holdings and Integrations.


Supported causes
Responsible consumption and production

About the company

Company
Brampton, Ontario, Canada
2 - 10 employees
Consumer goods & services, Transport, trucking & railroad

We are a subscription based tech startup serving the Logistics Industry. We are creating a simple, intuitive and effective way to capture and verify shipment data at the shipper level while providing freight forwarders a tool to communicate with all supply chain participants.

Our advantage is our independence. We are neutral in an industry with a low trust threshold.