Discuss the current it cybersecurity policy

Assignment Help Management Information Sys
Reference no: EM132130798


Project #6 Policy Review and Recommendations Presentation

Instructions

This is the final phase of the case study assignments. The primary purpose of this project is for you to demonstrate your understanding of the principles covered in this course.

You will create a minimum of 12 presentation slides to summarize the policy review conducted and your recommendations for the next steps the merged company should take to protect its data and information assets.

(MS Power Point .pptx format is the preferred delivery format; if you do not have Power Point, you may print your presentation slides to PDF and deliver the assignment as a PDF document.)

The title and reference slides are included in the required slide count.

Your presentation must include a minimum of 5 references.

Each policy review and recommendations presentation should address the following:

Current policy: Discuss the current (as per the case study) IT cybersecurity policy.

New technology: Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy.

Identify cybersecurity vulnerabilities that could be introduced by the new technology that might not be mitigated by technological configuration management.

Recommendations: Discuss revisions and modifications that must be made to the current IT cybersecurity policy to ensure that the new technology does not compromise the organization's cybersecurity posture.

Address the inter- and intra-organization leadership, managerial, and policy challenges and effects associated with the recommendations.

Reference no: EM132130798

Questions Cloud

What you think industrial companies should do to mitigate : During a disaster certain assets must be protected, and for industrial companies, this is not only for the company but also for the surrounding community.
Mean values required to reject the null hypothesis : Use the critical value method to find the critical difference in the mean values required to reject the null hypothesis.
What are the observational units in study : What are the observational units in this study? What is the variable that is recorded? Describe the parameter of interest in words
What is the probability that a or b occurs : P(B)=0.4.If A and B are disjoint, what is the probability that A or B occurs?P(A?B)=
Discuss the current it cybersecurity policy : Create a minimum of 12 presentation slides to summarize the policy review conducted and your recommendations for the next steps the merged company.
Describe how technical goals can be coupled : Describe how technical goals can be coupled with information assurance and security considerations in a network design project.
Plan for an integrated marketing communications : You are the Marketing Development Team of a global organisation. Your team is to plan for an integrated marketing communications launch of a new product
Analyze what you believe to be the three most important : Explain how these factors change when considering wireless technologies from a personal perspective.
Write a critical evaluation of the article : Using the University Digital Library or the Google scholar website, locate a peer reviewed article about privacy.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How has mobile commerce played role in business development

How has mobile commerce played a role in new business development in the retail market? How can mobile technology be used by brick-and-mortar retailers to enhance the in-store shopping experience?

  How it specifically impacts the creation of digital media

Describe each practice, explain why it is a best practice, and then relate it to how it specifically impacts the creation of digital media within chosen specialization, as opposed to only providing general content that could apply to any digital m..

  Provide information about the social media platform

Provide information about the social media platform. Provide information about the organization and its campaign. Discuss the campaign based on the information discussed in the Unit lesson.

  Difference between primary and secondary information sources

Describe the difference between primary and secondary information sources. Define data, character, field, record, file, and information. Give examples of each

  Describe the measurable benefits of progressing up the cmmi

Elaborate on three (3) of the obstacles that must be overcome as a business moves up the CMMI model.

  Describe the challenges that enterprise applications pose

In your own words, describe the challenges that enterprise applications pose and how are enterprise applications taking advantage of new technologies? A successful answer will include three paragraphs with at least five sentences in each paragra..

  Explain quality and its importance to project success

Describe the different quality activities involved in this project and each of their outcomes. Describe Pareto diagrams and their use in project management. Present the data in the provided scenario using a Pareto diagram (Use the software of your ch..

  Write paper for publication to the website

Please prepare a white paper for publication to the website (APA Format) that discusses knowledge management systems. Please begin by explaining the differences among data, information and knowledge

  The tco for the entire information system in campus travel

The TCO for the entire information system in Campus Travel. Hint: Sum all the values for all the systems together.

  Explain why other operating systems may or may not fit

As the system administrator, you are always looking for ways to improve your network. Although there are many different types of operating systems, there are many versions of the operating systems, as well. After much research, you have decided th..

  Explain the concepts of information systems security

Explain in detail the potential impact of the three (3) selected malicious attacks. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

  What consequences did the offender sustain-prison time

Compare white collar crime in the United States to white collar crime in India: what are the characteristics of people in India who commit white collar crime (e.g: age, occupation or profession, lifestyle). Find a case of white collar crime that ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd