Describe cyber security governance including major component

Assignment Help Computer Engineering
Reference no: EM132605455

Assignment: One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.

As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.

Part 1: Develop a 2- to 3-page table in Microsoft Word that lists the roles and responsibilities of each of the following with respect to security.

Use the following column headings:

• Title

• Role

• Responsibilities

• Use the following row headings:

• Chief Executive Officer (CEO)

• Chief Operations Officer (COO)

• Chief Financial Officer (CFO)

• Chief Information Officer (CIO)

• Chief Information Security Officer (CISO)

• Senior Security Manager

• Information Security Architect

• Information Security Engineer

• Information Security Auditor

• Information Security Analyst

• Security Technician/Specialist

Part 2: Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:

• Concisely describe cyber security governance, including major components like organizational oversight and security processes.

• Recommend an information security control framework.

• Logically explain how an information security control framework benefits a business.

• Describe one organizational challenge of implementing information security and provide an example of how you, the CISO,would address the challenge.

• Include supportive graphics and appropriate backgrounds and styles. Don't use images unless you obtain permission from the copyright holder or you use copyright-free images.

Format all citations according to APA guidelines.

Reference no: EM132605455

Questions Cloud

Determine the current ratio and the quick ratio : Question - The following items are reported on a company's balance sheet: Cash $265,900. Determine the current ratio and the quick ratio
Describe your current environment in brief : Describe your current environment. What is going on around you at this moment? Is there noise in the room? Noise outside the room? What do you see?
Which is least apt to affect the value of a warrant : Which is least apt to affect the value of a warrant?Variance of underlying stock returns./ Market rate of return./ Underlying stock price
Epigenetic influences on personality and behavior : Explain the implications of the research on parental behavior and environmental factors as they relate to human personality development.
Describe cyber security governance including major component : Concisely describe cyber security governance, including major components like organizational oversight and security processes.
What the lower limit of a warrant value is defined as : What the lower limit of a warrant value is defined as? MIN(0, Exercise price - Stock price)./ MAX(0, Stock price - Exercise price).
Discuss the independence of the fasb over time : Discuss the independence of the FASB over time. Refer to events and relationships that have enhanced or compromised their independence
Freudian and jungian theories of the unconscious mind : Compare and contrast the basic assumptions of the two theories and note the similarities and the differences as they relate to human behavior.
What are some possible alternatives : What are some possible alternatives? What other factors not provided above might be relevant to the decision?You are only taking 12 credit hours

Reviews

Write a Review

Computer Engineering Questions & Answers

  What sequence of numbers would be printed

What sequence of numbers would be printed by the following recursive function if we started it with N assigned the value 1?

  Write a function that can solve an ode using modified euler

Write a function that can solve an ODE using Modified Euler's method. This function will work similarly to ode45, but the step size will have to be specified.

  What are the primary types of nonfunctional requirements

What are the primary types of nonfunctional requirements? Give two examples of each. What role do nonfunctional requirements play in the project overall?

  Describe the organization of a von neumann machine

COMPUTER ARCHITECTURE-Year 3 Semester I-Describe the organization of a von Neumann machine, its major functional units, its strength and weaknesses.

  Determining what the problem is

This section will focus on the presentation of a literature-supported, open research question or problem that must be addressed. Additional areas should include

  Advantages and disadvantages of end-user computing

Explain the advantages and disadvantages of the end-user computing and determine if this is an application which should be progressively pursued. Describe your rationale.

  What is a ddos attack

What is a DDoS attack? In what two ways was the KrebsonSecurity.com DDoS attack unusual? What specific security weakness did the Mirai malware.

  Why does it need to show business case for their activities

In 175 words or more why does IT need to show a business case for all their activities and why is this difficult for operations and maintenance activities.

  Development of the clients database system

You are required to present an overview of the fact-finding techniques that your company intends to use to support the development of the client's database system.

  Discuss the team dynamics for a highly effective team

Discuss the team dynamics for a highly effective or ineffective team of which you were a member. Can you explain why the team performed so well or so poorly?

  Develop a product service idea

Develop a product service idea. Describe the product/service including the benefits of using the product/service.

  Octal and binary the mayan number

Convert to base hex, decimal, octal and binary the Mayan number (base 20) J7GE.I8H (all done in arithmetic in decimal)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd