Implementation of forescout and tenable

Assignment Help Basic Computer Science
Reference no: EM133192716

Create a PowerPoint presentation to the CIO and the CTO detailing how you provide will move the Cybersecurity Program forward during your first six months in the role as Senior Cybersecurity Analyst.

You are to create your presentation using the following information:

The Cybersecurity Program has a budget of $726,554 not including personnel costs. Within that budget, there are funds to complete the following tasks:

Plan and continue the implementation of ForeScout and Tenable. Each of these items have been purchased but they are not operational at this time.

Work under the leadership of the Virtual Chief Security Officer (vCISO) and CIO.

Plan and deploy the spring/summer security awareness training campaign for all employees.

Select vendor to provide a Security Operations Center (SOC) managed services for the new City Fiber network.

Cyber security analyst will continue to monitor cyber security activity and continue to perform analysis of cyber security events utilizing cyber security tools such as Huntress and McAfee.

Review the configuration of the new Palo Alto firewalls that which will be installed in March to provide increased security protection.

Reference no: EM133192716

Questions Cloud

Current communication security protocols : IT 549-Southern New Hampshire University-List of potential threats to and vulnerabilities of current communication security protocols of organization
Physical network and a logical network : ISSC 641-Central Texas College-What is the difference between a physical network and a logical network? Compare and contrast: Internet, Intranet, and Extranet.
Impacts culture and change management practices : Northwestern Polytechnic University-Define the IT organizational structure and how IT organizational structure impacts culture and change management practices.
Business and IT Discussion : ECOM 500-Saudi Electronic University-What social technology strategy would you recommend? How would this strategy benefit the organization?
Implementation of forescout and tenable : Plan and continue the implementation of ForeScout and Tenable. Each of these items have been purchased but they are not operational at this time.
Research security audit procedures : University of the Cumberlands-Research Security Audit Procedures and write a high-level procedure guide.
Leadership Role Of CIO : We have learned about Leadership roles in IT, one of these roles is that of a CIO. Discuss your views and expectations regarding the various skills
Report analysis of canadian solar essay : Name the 10 levels of the DGI Data Governance framework from the Data Governance Institute?
Develop cause and effect diagram for the situation : Using your force field analysis, develop a cause and effect diagram for the situation.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Application-information security laws

You probably obey most laws; however, you may not view some seriously enough to obey them. For example, you might be someone who is comfortable going faster than the posted speed limit. Is it all right to ignore some laws because they do not seem ..

  Identify 3 three difference network monitoring tools

Which one will your recommended for your business and which one will you personally use to protect your home office network.

  Accessing cascading styles sheet

Define and explain the S function as used in JavaScript when accessing Cascading Styles Sheet

  Problem regarding the social networking site

Consider the security needs of an e-commerce company, such as eBay, and those of a social networking site, such as Facebook.

  Cyber breach at target

What is your diagnosis of the breach at Target-was Target particularly vulnerable or simply unlucky?

  Write a recursive

Write a recursive, int -valued function named productOfOdds that accepts an integer array, and the number of elements in the array and returns the product of the odd-valued elements of the array. You may assume the array has at least one odd-value..

  Calculate the total number of ways this can be done

Two students want to sit on opposite sides to each other and another two want to sit on the same side with windows.

  How many of these one million pairs will hash to the bucket

If we hash each field to a large number of buckets, as suggested by Example 22.9, how many of these one million pairs will hash to the same bucket for at least one of the three hashings?

  Converting the pruned tree to rules

Given a decision tree, you have the option of (a) converting the decision tree to rules and then pruning the resulting rules, or (b) pruning the decision tree and then converting the pruned tree to rules. What advantage does (a) have over (b)?

  Why is understanding hacking-exploitation-vulnerabilities

Why is understanding hacking, exploitation, vulnerabilities, and attacks critically important? What motivates hackers to attack computer networks?

  What are the shortcomings and limitations

Assume you have decided to implement DFS so remote sites can access files and folders. What are the requirements for DFS? What are benefits of using DFS? What are the shortcomings and limitations?

  Examine the us passenger airline industry

Examine the U.S. passenger airline industry using the five forces. Is this an attractive industry? Why or why not?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd