How to ensure information systems security issues

Assignment Help Software Engineering
Reference no: EM13779959

Research the role of the Chief Information Security Officer (CISO) to find answers to the following questions:

1. What is the role of the CISO in an organization?

2. What types of knowledge, skills, and abilities are most important for a successful CISO to have?

3. How can a CISO contribute to making security a priority during the system development life cycle (SDLC)? (Provide specific examples for two or more phases of the SDLC.)

Write a plain English summary of your research making sure that you provide a detailed answer for each question along with appropriate examples.

Your response must be 150+ words in length and contain APA format in-text citations and references.

Suggested Resource:

Brenner, B. (2010, November 2). The New CISO: How the role has changed in 5 years. CISO. Retrieved from https://www.csoonline.com/article/print/632223

2. Business Continuity Planning (BCP) is a critical business process which requires the participation of managers from all parts of the enterprise. The CISO and CISO staff members should be key players on the BCP team. In this learning activity you will learn more about the BCP process and then answer questions about CISO participation on this team.

Watch three Federal Emergency Management Agency (FEMA) videos on the importance of Business Continuity Planning (BCP). Follow these instructions to access the videos:

1. Open the READY.GOV Web site: https://www.ready.gov/business-continuity-planning-suite
2. Scroll down to the tabs and read the content under the tab labeled "Learn about the tools"
3. Click on the tab labeled "Business Continuity Video Training."
4. Click on and watch the first three videos on the Web page:
(a) Business Continuity Training - Introduction,
(b) Business Continuity Training - Part One What is Business Continuity Planning?
(c) Business Continuity Training - Part Two Why is Business Continuity Planning Important?

If you cannot view the videos, read the transcripts which are posted below this discussion question.

After you have watched the videos (or read the transcripts), reflect upon the relationship between business continuity planning and the overarching security requirements to protect the confidentiality, integrity, and availability of information and information systems EVEN DURING A DISASTER. Write a plain English explanation of this relationship. In your explanation, address the following:

Identify and discuss three reasons (from the videos) as to why business continuity planning is important to an organization's overall information systems security program.

Identify and discuss the harm that could occur if a business is not prepared to respond to a disaster which prevents restoration of business operations at the original site within 72 hours (3 days) -- the standard time criteria for invocation of a business continuity plan after a disaster has occurred.

How can the CISO and CISO staff members help to ensure that the BCP process appropriately addresses information systems security issues?

Reference no: EM13779959

Questions Cloud

Explain the ethical issues that arise in this situation : Explain the ethical issues that arise in this situation. Explain how you would respond to Joint Commission concerns
State government levy tariffs on imports : Why not have State governments levy tariffs on imports, or tax other states' products. Would this be a sensible way to raise revenues? What are the advantages/disadvantages? Provide research support for your positions. Respond to at least two ..
Problem related to the house for rent : You have been relocated by your employer to a new city for an assignment that will probably last for two years.  You do not want to sell your home - a four-bedroom, two-bath Tudor - so you decide to rent it.
Problem regarding the buying a house : Imagine you are a public administrator who has just been promoted to a higher position but must relocate to another city and purchase a different home. Using the five distributing bargaining skills, present the steps and various aspects you would ..
How to ensure information systems security issues : How can the CISO and CISO staff members help to ensure that the BCP process appropriately addresses information systems security issues
Withholding information case : Read the Withholding Information Case and address the following: Identify ethical systems that may guide the parties to a negotiation.
Elements of negotiation and bargaining skills : Discuss the following statements then respond to at least two of your fellow students' posts.
Negotiation process-distributive bargaining : Define the Four Stages of the Negotiation Process and discuss what changes have taken place in the negotiation tactics since the 1950s.
Determine the weight percent of selenium : Determine the weight percent of selenium in the soil sample and find the absolute uncertainty in the wt% Se. Report the weight percent and absolute uncertainty with three significant figures.

Reviews

Write a Review

Software Engineering Questions & Answers

  Find the difference between text enclosed

When the shell is reading the command line what is the difference between text enclosed between double quotes (") and text enclosed between single quotes (')? Consider two cases.

  You will apply the basic steps of the sdlc to building the

identify and document a full information system for a small company. you will apply the basic steps of the sdlc to

  Inventory of the software products

Take an inventory of the software products on your laptop or pc. If you do not have one, visit the library or computer lab. Select three of the software products on the computer

  Project brieffor realz is a real estate agency which

project brieffor realz is a real estate agency which focuses on residential leasing. they lease properties houses as

  What is a programming methodologyhow is structured

1.why do we say that computer languages have evolved?2.what is the software development life cycle?3.what are two

  Design and list 10 test cases and explain the purpose

Design and list 10 test cases and explain the purpose of each of them in 1-2 sentences. (e.g., the purpose of [3, 4, 5] is to test that the program correctly identifies a right angle [9 + 16 = 25]).

  Explian test plan or script

Testing process summary: Define a test plan or script that identifies major software functionality and hardware to be tested with the required outcomes

  Create the system architecture models

Use CASE tool Model to create an application class model that includes entity classes, user interface classes, boundary, and controller classes - Use CASE tool Model to create the System Architecture models

  What happens when each unit is tested successfully

What happens when each unit is tested successfully and then the entire system is tested and it doesn't integrate well with other systems? Is this a possibility

  The firm has three major departments recruitment training

the firm has three major departments recruitment training and career services. the training centre provides management

  Identifying the tokens

Suppose that we are looking in a programming language that allows underscore in variable names. When a scanner sees a character string such as AB_CD.

  Which could be used for inter-processor communication

The case study is a simple reader-writer protocol (introduced in the lectures) which could be used for inter-processor communication in a distributed, multiprocessor system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd