SlideShare uma empresa Scribd logo
1 de 5
This assignment consists of five (5) parts:
Part 1: Organization Chart
Part 2: Request for Proposal (RFP) Plan
Part 3: Physical Security Plan
Part 4: Enterprise Information Security Compliance Program
Part 5: Risk Management Plan
Imagine that you have been recently promoted to serve as Chief
Information Security Officer (CISO) for a Fortune 500
organization. This organization has known brand products
across the world and expects top-secret methods for
safeguarding proprietary information on its recipes and product
lines. The Board of Directors request that their information
security strategy be upgraded to allow greater opportunities of
secure cloud collaboration between suppliers and resellers of
their products. Another concern they have is the recent number
of hacktivist attacks that have caused the network to fail across
the enterprise. Their concern extends to making sure that they
have controlled methods for accessing secured physical areas
within their various regional facilities.
For your new position, you will be responsible for developing
standards, methods, roles, and recommendations that will set the
new IT security path for the organization. The existing
organization has limited experience in supporting an enhanced
level of IT security; therefore, you may need to outsource
certain security services.
Additionally, you may create and / or assume all necessary
assumptions needed for the completion of this assignment.
Write an
eight to twelve (8-12)
page paper in which you provide the following deliverables:
Part 1: Organization Chart
1. Use Visio or an Open Source alternative, such as Dia, to:
a. Create an organization chart in which you:
i. Illustrate the roles that will be required to ensure
design, evaluation, implementation, and management of security
programs
for the organization.
ii. Within your organizational chart, clearly identify the
reporting structure for roles such as IT Security Compliance
Officer,
Security Manager, CIO, CISO, IT Security Engineer,
Privacy Security Professional, and IT Procurement Specialist.
iii. List the types of resources required to fulfill the each
forensic duty of the organization below each of the roles you
identified.
iv. Align your organization chart to reflect the
Department of Homeland Security (DHS) Essential Body of
Knowledge’s three (3)
areas of information security: physical security
professional, privacy professional, and procurement
professional. Provide
comments and comparisons on how your organizational
chart fosters these three (3) values.
Part 2: Request for Proposal (RFP) Plan
2. Develop a Request for Proposal (RFP) plan to solicit
qualified vendors that could partner with your internal team to
deliver optimum
IT service delivery. The RFP Plan should contain qualifying
criteria of potential vendors and the responsibilities of the
vendor once
the contract is awarded. As part of the plan, you must:
a. Describe at least two (2) perspectives that need to be
closely monitored within the contract.
b. Give your perspective on at least two (2) methods that
could be used to evaluate and develop a qualified trusted
supplier list.
Part 3: Physical Security Plan
3. Recommend a physical security plan that could be used to
protect sensitive areas such as telecom rooms, employee only
areas,
and manufacturing facilities in which you:
a. Include at least three (3) specific methods.
Part 4: Enterprise Information Security Compliance Program
4. Establish an enterprise information security compliance
program that addresses the concerns of the board of directors of
the
organization in which you:
a. Describe specific plans and control objectives that could
be adopted to address the known issues.
b. Suggest at least three (3) information security policies that
could be developed and practiced within the organization for
data
security assurance.
c. Outline the steps you would take to define the security
needs of the organization in terms of duties, staffing, training,
and
processes.
Part 5: Risk Management Plan
5. Develop a risk management plan in which you:
a. Describe at least three (3) possible risk management
efforts that could be used to assess threats and unknown issues.
b. Determine why defining priorities is an important part of
the process when enumerating and having efficient risk control
measures.
c. Suggest specific technical and management controls that
could be enacted in order to monitor risks accurately.
6. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or one of its
equivalents such as Dia. The completed diagrams / charts must
be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
Describe and apply the 14 areas of common practice in the
Department of Homeland Security (DHS) Essential Body of
Knowledge.
Describe best practices in cybersecurity.
Describe physical security plans and processes.
Evaluate the ethical concerns inherent in cybersecurity and how
these concerns affect organizational policies.
Explain legal and regulatory compliance practices.
Explain risk management plans and policies.
Describe physical security plans and processes.
Develop a cybersecurity plan that incorporates the Department
of Homeland Security (DHS) Essential Body of Knowledge.
Identify the strategic management issues in cybersecurity
planning and response.
Explain data security competencies to include turning policy
into practice.
Compare and contrast the functional roles of an organization in
the context of cybersecurity.
Identify and analyze the role of the Chief Information Officer,
Information Security Officer, and IT Security Compliance
Officer in the context of cybersecurity.
Use technology and information resources to research issues in
cybersecurity.
Write clearly and concisely about topics associated with
cybersecurity using proper writing mechanics and technical
style conventions.

Mais conteúdo relacionado

Semelhante a This assignment consists of five (5) parts     Part 1 Organizati.docx

Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comRobinson075
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comsholingarjosh63
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comStephenson06
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comMcdonaldRyan39
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comrobertleses9
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comdonaldzs56
 
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxAssignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxmurgatroydcrista
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comrobertlesew96
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.comjhonklinz11
 
Title Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information SecuritTitle Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information Securitmarilynnhoare
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxmydrynan
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.comKeatonJennings98
 
Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxannrodgerson
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxbriancrawford30935
 

Semelhante a This assignment consists of five (5) parts     Part 1 Organizati.docx (17)

Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxAssignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
Title Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information SecuritTitle Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information Securit
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docx
 

Mais de terirasco

This homework cannot be done until after we watch the movie 12 Angry.docx
This homework cannot be done until after we watch the movie 12 Angry.docxThis homework cannot be done until after we watch the movie 12 Angry.docx
This homework cannot be done until after we watch the movie 12 Angry.docxterirasco
 
This has 4 parts and needs to be 2 paragraphs long each one with ref.docx
This has 4 parts and needs to be 2 paragraphs long each one with ref.docxThis has 4 parts and needs to be 2 paragraphs long each one with ref.docx
This has 4 parts and needs to be 2 paragraphs long each one with ref.docxterirasco
 
This final project aims to empirically complement concurrent theor.docx
This final project aims to empirically complement concurrent theor.docxThis final project aims to empirically complement concurrent theor.docx
This final project aims to empirically complement concurrent theor.docxterirasco
 
This has to be done in an IDE and I need the entire application fold.docx
This has to be done in an IDE and I need the entire application fold.docxThis has to be done in an IDE and I need the entire application fold.docx
This has to be done in an IDE and I need the entire application fold.docxterirasco
 
This has 4 parts and needs to be 3 paragraphs long with references..docx
This has 4 parts and needs to be 3 paragraphs long with references..docxThis has 4 parts and needs to be 3 paragraphs long with references..docx
This has 4 parts and needs to be 3 paragraphs long with references..docxterirasco
 
this essay are  pursuasive essay and it should be 3 pages.and yo.docx
this essay are  pursuasive essay and it should be 3 pages.and yo.docxthis essay are  pursuasive essay and it should be 3 pages.and yo.docx
this essay are  pursuasive essay and it should be 3 pages.and yo.docxterirasco
 
This chapter reflection should beinclude1.Should be 1 to.docx
This chapter reflection should beinclude1.Should be 1 to.docxThis chapter reflection should beinclude1.Should be 1 to.docx
This chapter reflection should beinclude1.Should be 1 to.docxterirasco
 
This discussion provides an opportunity to evaluate a variety of dig.docx
This discussion provides an opportunity to evaluate a variety of dig.docxThis discussion provides an opportunity to evaluate a variety of dig.docx
This discussion provides an opportunity to evaluate a variety of dig.docxterirasco
 
This course is in Business EthicsWhen considering ethical behav.docx
This course is in Business EthicsWhen considering ethical behav.docxThis course is in Business EthicsWhen considering ethical behav.docx
This course is in Business EthicsWhen considering ethical behav.docxterirasco
 
This chapter provides an explanation of what leads to the emergent p.docx
This chapter provides an explanation of what leads to the emergent p.docxThis chapter provides an explanation of what leads to the emergent p.docx
This chapter provides an explanation of what leads to the emergent p.docxterirasco
 
This assignment requires Ambulatory Care Coding experience.You CAN.docx
This assignment requires Ambulatory Care Coding experience.You CAN.docxThis assignment requires Ambulatory Care Coding experience.You CAN.docx
This assignment requires Ambulatory Care Coding experience.You CAN.docxterirasco
 
This Assignment will give you an opportunity to apply techniques of .docx
This Assignment will give you an opportunity to apply techniques of .docxThis Assignment will give you an opportunity to apply techniques of .docx
This Assignment will give you an opportunity to apply techniques of .docxterirasco
 
This assignment requires 3 drafts, 2 rough drafts and the final draf.docx
This assignment requires 3 drafts, 2 rough drafts and the final draf.docxThis assignment requires 3 drafts, 2 rough drafts and the final draf.docx
This assignment requires 3 drafts, 2 rough drafts and the final draf.docxterirasco
 
This assignment tests your ability to correctly identify and apply.docx
This assignment tests your ability to correctly identify and apply.docxThis assignment tests your ability to correctly identify and apply.docx
This assignment tests your ability to correctly identify and apply.docxterirasco
 
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docxThis assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docxterirasco
 
This assignment is to be completed with A+ original work due S.docx
This assignment is to be completed with A+ original work due S.docxThis assignment is to be completed with A+ original work due S.docx
This assignment is to be completed with A+ original work due S.docxterirasco
 
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docxThis assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docxterirasco
 
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docxThis assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docxterirasco
 
This assignment is due on Tuesday Dec 29th before midnight estern st.docx
This assignment is due on Tuesday Dec 29th before midnight estern st.docxThis assignment is due on Tuesday Dec 29th before midnight estern st.docx
This assignment is due on Tuesday Dec 29th before midnight estern st.docxterirasco
 
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docxThis assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docxterirasco
 

Mais de terirasco (20)

This homework cannot be done until after we watch the movie 12 Angry.docx
This homework cannot be done until after we watch the movie 12 Angry.docxThis homework cannot be done until after we watch the movie 12 Angry.docx
This homework cannot be done until after we watch the movie 12 Angry.docx
 
This has 4 parts and needs to be 2 paragraphs long each one with ref.docx
This has 4 parts and needs to be 2 paragraphs long each one with ref.docxThis has 4 parts and needs to be 2 paragraphs long each one with ref.docx
This has 4 parts and needs to be 2 paragraphs long each one with ref.docx
 
This final project aims to empirically complement concurrent theor.docx
This final project aims to empirically complement concurrent theor.docxThis final project aims to empirically complement concurrent theor.docx
This final project aims to empirically complement concurrent theor.docx
 
This has to be done in an IDE and I need the entire application fold.docx
This has to be done in an IDE and I need the entire application fold.docxThis has to be done in an IDE and I need the entire application fold.docx
This has to be done in an IDE and I need the entire application fold.docx
 
This has 4 parts and needs to be 3 paragraphs long with references..docx
This has 4 parts and needs to be 3 paragraphs long with references..docxThis has 4 parts and needs to be 3 paragraphs long with references..docx
This has 4 parts and needs to be 3 paragraphs long with references..docx
 
this essay are  pursuasive essay and it should be 3 pages.and yo.docx
this essay are  pursuasive essay and it should be 3 pages.and yo.docxthis essay are  pursuasive essay and it should be 3 pages.and yo.docx
this essay are  pursuasive essay and it should be 3 pages.and yo.docx
 
This chapter reflection should beinclude1.Should be 1 to.docx
This chapter reflection should beinclude1.Should be 1 to.docxThis chapter reflection should beinclude1.Should be 1 to.docx
This chapter reflection should beinclude1.Should be 1 to.docx
 
This discussion provides an opportunity to evaluate a variety of dig.docx
This discussion provides an opportunity to evaluate a variety of dig.docxThis discussion provides an opportunity to evaluate a variety of dig.docx
This discussion provides an opportunity to evaluate a variety of dig.docx
 
This course is in Business EthicsWhen considering ethical behav.docx
This course is in Business EthicsWhen considering ethical behav.docxThis course is in Business EthicsWhen considering ethical behav.docx
This course is in Business EthicsWhen considering ethical behav.docx
 
This chapter provides an explanation of what leads to the emergent p.docx
This chapter provides an explanation of what leads to the emergent p.docxThis chapter provides an explanation of what leads to the emergent p.docx
This chapter provides an explanation of what leads to the emergent p.docx
 
This assignment requires Ambulatory Care Coding experience.You CAN.docx
This assignment requires Ambulatory Care Coding experience.You CAN.docxThis assignment requires Ambulatory Care Coding experience.You CAN.docx
This assignment requires Ambulatory Care Coding experience.You CAN.docx
 
This Assignment will give you an opportunity to apply techniques of .docx
This Assignment will give you an opportunity to apply techniques of .docxThis Assignment will give you an opportunity to apply techniques of .docx
This Assignment will give you an opportunity to apply techniques of .docx
 
This assignment requires 3 drafts, 2 rough drafts and the final draf.docx
This assignment requires 3 drafts, 2 rough drafts and the final draf.docxThis assignment requires 3 drafts, 2 rough drafts and the final draf.docx
This assignment requires 3 drafts, 2 rough drafts and the final draf.docx
 
This assignment tests your ability to correctly identify and apply.docx
This assignment tests your ability to correctly identify and apply.docxThis assignment tests your ability to correctly identify and apply.docx
This assignment tests your ability to correctly identify and apply.docx
 
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docxThis assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
 
This assignment is to be completed with A+ original work due S.docx
This assignment is to be completed with A+ original work due S.docxThis assignment is to be completed with A+ original work due S.docx
This assignment is to be completed with A+ original work due S.docx
 
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docxThis assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
 
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docxThis assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
 
This assignment is due on Tuesday Dec 29th before midnight estern st.docx
This assignment is due on Tuesday Dec 29th before midnight estern st.docxThis assignment is due on Tuesday Dec 29th before midnight estern st.docx
This assignment is due on Tuesday Dec 29th before midnight estern st.docx
 
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docxThis assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
 

Último

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Último (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

This assignment consists of five (5) parts     Part 1 Organizati.docx

  • 1. This assignment consists of five (5) parts: Part 1: Organization Chart Part 2: Request for Proposal (RFP) Plan Part 3: Physical Security Plan Part 4: Enterprise Information Security Compliance Program Part 5: Risk Management Plan Imagine that you have been recently promoted to serve as Chief Information Security Officer (CISO) for a Fortune 500 organization. This organization has known brand products across the world and expects top-secret methods for safeguarding proprietary information on its recipes and product lines. The Board of Directors request that their information security strategy be upgraded to allow greater opportunities of secure cloud collaboration between suppliers and resellers of their products. Another concern they have is the recent number of hacktivist attacks that have caused the network to fail across the enterprise. Their concern extends to making sure that they have controlled methods for accessing secured physical areas within their various regional facilities. For your new position, you will be responsible for developing standards, methods, roles, and recommendations that will set the new IT security path for the organization. The existing organization has limited experience in supporting an enhanced level of IT security; therefore, you may need to outsource certain security services. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. Write an eight to twelve (8-12) page paper in which you provide the following deliverables: Part 1: Organization Chart 1. Use Visio or an Open Source alternative, such as Dia, to: a. Create an organization chart in which you: i. Illustrate the roles that will be required to ensure design, evaluation, implementation, and management of security
  • 2. programs for the organization. ii. Within your organizational chart, clearly identify the reporting structure for roles such as IT Security Compliance Officer, Security Manager, CIO, CISO, IT Security Engineer, Privacy Security Professional, and IT Procurement Specialist. iii. List the types of resources required to fulfill the each forensic duty of the organization below each of the roles you identified. iv. Align your organization chart to reflect the Department of Homeland Security (DHS) Essential Body of Knowledge’s three (3) areas of information security: physical security professional, privacy professional, and procurement professional. Provide comments and comparisons on how your organizational chart fosters these three (3) values. Part 2: Request for Proposal (RFP) Plan 2. Develop a Request for Proposal (RFP) plan to solicit qualified vendors that could partner with your internal team to deliver optimum IT service delivery. The RFP Plan should contain qualifying criteria of potential vendors and the responsibilities of the vendor once the contract is awarded. As part of the plan, you must: a. Describe at least two (2) perspectives that need to be closely monitored within the contract. b. Give your perspective on at least two (2) methods that could be used to evaluate and develop a qualified trusted supplier list.
  • 3. Part 3: Physical Security Plan 3. Recommend a physical security plan that could be used to protect sensitive areas such as telecom rooms, employee only areas, and manufacturing facilities in which you: a. Include at least three (3) specific methods. Part 4: Enterprise Information Security Compliance Program 4. Establish an enterprise information security compliance program that addresses the concerns of the board of directors of the organization in which you: a. Describe specific plans and control objectives that could be adopted to address the known issues. b. Suggest at least three (3) information security policies that could be developed and practiced within the organization for data security assurance. c. Outline the steps you would take to define the security needs of the organization in terms of duties, staffing, training, and processes. Part 5: Risk Management Plan 5. Develop a risk management plan in which you: a. Describe at least three (3) possible risk management efforts that could be used to assess threats and unknown issues. b. Determine why defining priorities is an important part of the process when enumerating and having efficient risk control measures. c. Suggest specific technical and management controls that could be enacted in order to monitor risks accurately. 6. Use at least three (3) quality resources in this assignment.
  • 4. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. Describe best practices in cybersecurity. Describe physical security plans and processes. Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies. Explain legal and regulatory compliance practices. Explain risk management plans and policies. Describe physical security plans and processes. Develop a cybersecurity plan that incorporates the Department of Homeland Security (DHS) Essential Body of Knowledge. Identify the strategic management issues in cybersecurity planning and response. Explain data security competencies to include turning policy into practice. Compare and contrast the functional roles of an organization in the context of cybersecurity. Identify and analyze the role of the Chief Information Officer,
  • 5. Information Security Officer, and IT Security Compliance Officer in the context of cybersecurity. Use technology and information resources to research issues in cybersecurity. Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.