Explain roles of given involved in ig policy development

Assignment Help Management Information Sys
Reference no: EM132324272

Assignment: For this discussion you are to explain the roles and responsibilities of those involved in IG policy development.

Select one of the individuals from the following list and discuss what role they play in IG policy development:

• IT Security Analyst

• IT Security Engineer

• IT Audit

• IT Risk

• Compliance

• CISO- Chief Information Security Officer

• CIO- Chief Information Officer

• CTO - Chief Technology Officer

• CEO- Chief Executive Officer

• CFO- Chief Financial Officer

• CPO- Chief Privacy Officer

• Legal

• Governmental Affairs

Next, take the role and select a law, standard, or regulation to apply their role. Lastly, find a company that either uses the standard or is subject to the law or regulation.

There are enough standards and roles that no 2 posts should be the same as an effort to cut down on the potential of the class sharing work. No two individuals are to use the same combination in their post.

Reference no: EM132324272

Questions Cloud

Specify what type of cabling would run to each workstation : Specify what type of cabling would run to each workstation. Specify the connections between the network devices and servers (what type of network are you).
What are the countries with highest hiv epidemic : What are the countries with highest HIV epidemic? What is the healthiest country? What types of correlation can you see between less HIV infections.
Discuss other ways you will get stakeholder input : Discuss other ways you will get stakeholder input. Create your Strategic Plan (a sample has been uploaded). Draft a Vision, Mission, and Values area.
Define what you learned from visiting the website : Please describe the purpose of the website. What you learned from visiting the website. Anything else what you want to describe.
Explain roles of given involved in ig policy development : For this discussion you are to explain the roles and responsibilities of those involved in IG policy development. Select one of the individuals from.
Why you are focusing on specific three security principles : Why you are focusing on the specific three security principles? For each security principle, identify its relevance in the energy sector.
Identify the pillars and write a short description for each : From our weekly chapter reading, we learned that Crowdsourcing can be a very valuable tool for promoting and developing three main pillars of an open government
Defining the dynamic nature of leadership : Our observations from the case study reading in the chapter material, Leadership and Management in Complex Systems research by Jager and van der Vegt (2005).
Perform ema and esdma modeling in brief : The author briefly mentions an open source software tool, EMA Workbench, that can perform EMA and ESDMA modeling. Find EMA Workbench online and go to their.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Brute force user id and password attacks

Users or employees unaware of the risks, threats, and dangers of the Internet and shard WI-FI or broadband Internet Access.

  How the class scheduler can be limited to access a database

Discuss how the class scheduler can be limited to access a specific database or table. Also specify which login method you recommend to be used.

  Factors that cio or the it group must consider

List and discuss 3-5 factors a CIO or the IT group must consider with respect to data, technology, networks, or security when a company goes global

  Describe about the major changes that the company have

Describe about the major changes that the company (management, organization and technology) have to work on to ensure the Business Intelligence system.

  The use of a decision support systemwould using a decision

the use of a decision support systemwould using a decision support system in a business guarantee a better decision?

  Bring to her attention during the discussion

The personnel manager asks you to follow up with a short paper to her briefly going over the topics you discussed. She would like the document as a memo, highlighting the subject areas you thought worthy enough to bring to her attention during the di..

  Prepare two to three paragraph summary of the given article

Create a mind map, and write a two to three paragraph summary of the article that includes three questions for the class and a hyperlink to the original current event article.

  Describe one mcommerce application you have used

What are the pros and cons associated with the use of that application, particularly from the end user's and business's perspectives?

  What is an it risk assessments goal or objective

What is an IT risk assessment's goal or objective?Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure?What was your rationale in assigning a "1" risk impact/risk factor value of "Critical" to an identified risk, th..

  Explain wireless technologies and mobile technologies

Define wireless technologies and mobile technologies. Next, determine at least three (3) ways which companies or organizations utilize such technologies to improve business efficiency

  Identify the dependent variable and independent variables

What data pre-processing (if any) does the neuralnet method require for the Vertebral Column data?

  Principle of communication studies

Create a paper that, in some way, demonstrates your acquired knowledge of a core principle of communication studies - Issues within interpersonal communication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd