Reference no: EM133500844
Homework: Advocate for Preemption of Risks Presentation
Length: 15 slide.
Instructions
For this homework, you will develop a presentation that advocates for the preemption of risks implied from changes in technology used by organizations, threat actors, and control capabilities.
Be sure your presentation addresses the following:
Question 1) Create an analysis of viable improvement to solutions, technology use, threats, and vulnerabilities within a significant organization within one of the 16 critical industries.
Question 2) Be sure all content is forward-looking for the 5 years after today's date. There will be no recognition for content that covers areas that have already matured.
Question 3) Consider the evolution of technology, the response from threat actors, and new defenses.
Question 4) Be sure to use a persuasive presentation, which is suitable for delivery to the strategic planning body within the top leadership of your selected organization.
Question 5) Provide limited text on the slides, using multiple tables and simple figures created for this specific presentation.
Question 6) Provide bullet points with speaker notes and citations below the content slides and add a reference slide(s) at the end that uses 12-point fonts.
Reference
1) Cernat, R. (2020). Cyberwar and cyberterrorism. Features and answers to these threats. Romanian Military Thinking, 3, 100-115.
2) Chaudhry, J., Pathan, A.-S. K., Rehmani, M. H., & Bashir, A. K. (2018). Threats to critical infrastructure from AI and human intelligence. Journal of Supercomputing, 74(10), 4865-4866.
3) Cruz, J. de A. da, & Pedron, S. (2020). Cyber mercenaries: A new threat to national security. International Social Science Review, 96(2), 1b.
4) Jaf, S., Ghafir, I., Prenosil, V., Saleem, J., Hammoudeh, M., Faour, H., Jabbar, S., & Baker, T. (2018). Security threats to critical infrastructure: The human factor. Journal of Supercomputing, 74(10), 4986-5002.
5) Nguyen, L., & Sparks, J. L. (2020). Air, space, and cyberspace: Reinvigorating defense of US critical infrastructure. Air & Space Power Journal, 34(3), 44-53.
6) Zwier, D. (2019). Regulating data privacy and use: A key to modern national security? University of Pittsburgh Law Review, 81(2), 499-526.