Reference no: EM133233821
Assignment - Cyber Security Questions - Recommend a Continuous Monitoring Process Document
Books and Resources -
Warsinske, J., Graff, M., Henry, K., Hoover, C., Malisow, B., Murphy, S., Oakes, C.P., Pajari, G., Parker, T.P., Seidl,D., & Vasquez, M. (2019). Domain 2- asset security. In The official (ISC) 2 guide to the CISSP CBK Reference (5th ed., pp. 131-198). Wiley.
Read Domain 7: Security Operations, pages 597-672.
Hayhurst, C. (2018). Sewing up solutions. The role of software patch management in effective cybersecurity. Biomedical Instrumentation & Technology, 52(2), 92-102.
Baek, S., & Kim, Y.-G. (2019). Efficient vulnerability management process in the military. 2019 International Conference on Platform Technology and Service (PlatCon), (pp. 1-5).
Chapple, M., Stewart, J. M., & Gibson, D. (2018). (ISC)2 CISSP certified information systems security professional official study guide (8th ed.). Sybex.
Instructions - For this assignment, you must recommend a continuous monitoring process in a memo format to management in a specific organization (state the name of the organization). In this continuous monitory document, you will:
-Depict the roles and responsibilities of IT operational security.
-Depict the roles and responsibilities of IT compliance.
-Explain what areas each group will be responsible for monitoring and reporting to management.
You will present and record your recommendations and solutions, and keep in mind your audience will consist of the CSO.
Length: 12-15 PowerPoint slides (including 100-200 word speaker notes and citations below each content slide).
What are the benefits of incorporating social responsibility
: What are the benefits of incorporating social responsibility and sustainability principles into project management practices? What are the challenges?
|
What is the purpose of a stakeholder register
: What is the purpose of a Stakeholder Register and how is it used? How can a project manager incorporate this tool into controlling the project
|
How the federal reserve moved the federal funds rate
: Based on your understanding of the article, discuss how the Federal Reserve moved the federal funds rate before 2008
|
Define the priorities of a vaccine development project
: How to do a task where I must define the priorities of a vaccine development project with a clear justification of each priority that I have provided.
|
Depict the roles and responsibilities of it compliance
: Depict the roles and responsibilities of IT operational security. Depict the roles and responsibilities of IT compliance
|
What is urgency-proximity
: What is urgency, proximity, dormancy, manageability, controllability, detectability, connectivity, strategic impact, propinquity.
|
Explain the relationship between quality and competitiveness
: Explain the relationship between quality and competitiveness. Explain how the cost of poor quality can affect competitiveness.
|
Types of ethical and legal challenges
: Determine which type of shadow, as described of Meeting the Ethical Challenges of Leadership, best describes each ethical challenge.
|
Create an environment that fostered transparency
: The decisions made by senior Leadership and the organizational culture fostered an environment that proved to be disastrous leading to fatality.
|