Developing the corporate strategy for information security

Assignment Help Management Information Sys
Reference no: EM131483657 , Length: 5

Developing the Corporate Strategy for Information Security

Imagine that you are working for a startup technology organization that has had overnight success. The organization's immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.

As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization's data assets.

Review the following Website titled "Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development" for additional information necessary to complete this assignment.

Write a five (5) page paper in which you do the following, based on the scenario described below:

1. The Chief Information Security Officer (CISO) is responsible for several functions within an organization.

a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization.

b. Specify at least three (3) competencies that the CISO could perform using the provided Website titled, " Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce
Development."

2. The Chief Information Officer (CIO) is responsible for several accountability functions within an organization:

a. Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization.

b. Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.

c. Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis.

3. Describe how the digital forensics function complements the overall security efforts of the organization.

4. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry.

5. List at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations.

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131483657

Questions Cloud

Network engineer for a midsized government contractor : You are a network engineer for a midsized government contractor working on a project for a national government lab.
Design an it security policy framework : Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization.
Five types of teams on the team autonomy continuum : List the five types of teams on the team autonomy continuum.
Use of graphics in technical communications : How important is the use of graphics in technical communications?
Developing the corporate strategy for information security : Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization.
Derive the dual problem : Given the following primal problem, where is a symmetric positive semidefinite matrix, derive the dual problem.
Evaluate the use of the code of corporate governance : Critically evaluate the use of the Code of Corporate Governance for public listed Omani companies (with reference to Cadbury, Greenbury, Hampel and the "Combined Code "reports).
Learned about technical communication : Discuss what you have learned about technical communication during this course. Address the following areas in your post:
Discuss about the cloud computing : Discuss how cloud computing can reduce costs while providing a robust technological environment to improve organizational effectiveness.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How will personal identifiable information be separated

Summarize the responses to the questions from your team discussion.Choose the solution that you personally feel is the right solution.Explain the reason you made your choice and justify your choice with current references.Format your memo consistant ..

  Write about any two business intelligence tools

Write about any two business intelligence tools and describe briefly about them. The paper should include the introduction about business intelligence. Paper must be in APA format, contain more than 1400 words, and use at least 4 peer reviewed so..

  Evaluate the training you can provide to your staff

What actions, if any, should these personnel take toward the actions of the cleaning staff? What actions, if any, should be taken by the information systems administration?

  Business risk financial risk and beta1 define and discuss

business risk financial risk and beta1. define and discuss the relationship between business risk financial risk and

  Describe the scope of the project and control measures

Describe the scope of the project and control measures.Describe the goals and objectives of the project.Give a detailed, realistically estimated cost analysis of the entire project.Relate the value of the project plan solution to the competitive adv..

  Analyze internet security issues-available countermeasures

Your task is to identify the fundamental concepts of network security and security policy according to various viewpoints and try to systematize them in a succinct and yet comprehensive contribution. You may discuss typical attacks and how they af..

  How will the composition of the dream team

How will the composition of the dream team be changed if the following constraints are changed as follows: the average number of rebounds among the 12 selected players needs to be at least 8 rebounds per game

  Compare holism (systems thinking) versus reductionism

This research paper will compare and contrast Holism (Systems Thinking) versus Reductionism. The research paper must be submitted using Safe Assign.

  Choose a company that interest you-document their strategy

Choose a company that interest you and document their strategic plan, including:Vision, mission, objectives, goals, strategies, and measures,An industry analysis,A SWOT analysis,Identify two IT - related projects that would be consistent with this pl..

  Effect of technologytechnology and the lodging

effect of technologytechnology and the lodging industryprepare a paper in which you examine the affect of technology in

  Explaining robert anthony hierarchy of management activity

Explaining robert anthony hierarchy of management activity

  Social media sites to blame for lost productivity

Statistics showed that 70% of adults have used social media sites to connect with relatives in other states, and 57% of teens have reported making new friendships on social media sites which is amazing for some students who are socially uncomforta..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd