Describe the balanced scorecard domains

Assignment Help Computer Engineering
Reference no: EM133705145

Assignment

As the newly hired chief information security officer (CISO), you are tasked with developing the Best Care Community (BCC) hospital's information security program. There is no information security program in place, and your first task is to create the enterprise information security strategy that encompasses the company's mission, goals, and objectives, as well as appropriately reflects the risk tolerance and risk appetite of the company as a whole.

Review the Best Care Community Profile for Development of the Information Security Program to become familiar with the mission of the hospital.

You will complete the first steps of the initiative to develop the BCC enterprise information security strategy.

Part I

Create a 14 to 16 slides Microsoft PowerPoint informative presentation for the BCC leadership in which you:

1. Describe the three phases of strategic planning.

2. Diagram the three strategic planning phases with each of the five information security tasks as outlined in the BCC profile, mapping each to its respective strategic planning phase.

3. Describe the balanced scorecard domains.

4. Map the BCC business objectives into the appropriate balanced scorecard domains.

5. Recommend a prioritized list of BCC information security objectives mapped to the business objectives.

6. Map the BCC information security objectives into the appropriate balanced scorecard domains in a matrix format that depicts the objectives and initiatives.

Include a title slide.

Note: There will be two balanced scorecard sets: one for the business objectives and one for the information security objectives. The BCC BSC Scorecard Template provides a template for the scorecards in each domain. You will need to duplicate and label the scorecard slides in the template to create two sets of balanced scorecards, as well as add appropriate slides for the additional required content.

Part II

Write a 2 to 3 pages report that recommends one of the enterprise control frameworks. Your report should:

1. Describe your chosen enterprise architecture framework.

2. Determine how the business objectives correspond to the information security strategic objectives.

3. Explain how the enterprise architecture framework can be used to achieve business and information security alignment.

Reference no: EM133705145

Questions Cloud

Surgery suite to have colonoscopy : A 40-year-old male patient was taken to the same-day surgery suite to have a colonoscopy.
Types of stress and develop effective coping strategies : A key intervention for helping patients manage stress is teaching them to identify types of stress and develop effective coping strategies for use in daily life
Describes the role of fire prevention : Describes the role of fire prevention and community risk reduction as it applies to the fire organization.
Treatment of the open fracture of the distal phalanx : A 51-year-old male was brought to the same-day surgery area for treatment of the open fracture of the distal phalanx of his index finger on the left hand
Describe the balanced scorecard domains : Describe the balanced scorecard domains. Map the BCC business objectives into the appropriate balanced scorecard domains.
What substance of liberty in revolutionary-era america : Describe the substantial meaning of liberty in each of the four different senses Shain recounts on pages 161-166 of The Myth of American Individualism.
Diagnosed with cancer : Abigail was diagnosed with cancer and given six months to live. She has a life insurance policy with a provision that will pay out portion of her death benefit
Relationship between ostracism and collective action : What is the relationship between ostracism and collective action?
Role and impact of professional nursing organizations : Discuss the purpose, role and impact of professional nursing organizations and Political Action Committees (PACs) in advancing health policy issues?

Reviews

Write a Review

Computer Engineering Questions & Answers

  How do you define a high-risk transaction

How do you define a high-risk transaction? What are four roles (two sets of two related roles) you would separate and why?

  What exactly is cyberterrorism

What exactly is cyberterrorism? What is information warfare? How can information warfare be distinguished from cyberterrorism?

  Create a customer relationship management program

Create a Customer relationship management program in C language, content must have customer contact, sales data, sales analysis and sales report

  Write a program in python to solve a linear system

Write a program in Python to solve a linear system of the form Ax = b by Gaussian elimination with scaled partial pivoting.

  How can you use observation as a teaching tool

How can you use observation as a teaching tool? What biases do you bring with you to the classroom? How do you think you can become aware of our biases

  Does the system use a mbr or gpt

Does the system use a MBR or GPT? In each case, provide a screenshot to evidence how you obtained these values. If the number of sectors per cluster were

  Write the numbers from 1 through 30 to the file

Write a python code that opens a file called numbers.txt for writing. Use a loop to write the numbers from 1 through 30 to the file, and close the file.

  Write a regular expressions for numbers which can be

Write a regular expressions for numbers which can be natural numbers or decimal mumbers, or numbers with exponent.

  Demonstrate the required functionality

Priorities and numbers of processes can be kept small, just big enough to demonstrate the required functionality.

  How many independent memory channels should be provided

how many independent memory channels should be provided so the system is not limited by memory bandwidth if the bandwidth required is sometimes twice the average?

  List the calls to quicksort and partition in the order

Trace the quick sort algorithm as it sorts the following array into ascending order. List the calls to quickSort and partition in the order in which they occur.

  How are encodings same or different from run-length encoding

How are the encodings the same or different from run-length encodings?Why wouldn't a game using just run-length encodings be challenging?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd