Reference no: EM133204692 , Length: 2 pages.
Discussion Post: Science Communication Strategy
A recent internal audit uncovered a lack of knowledge on the part of employees and included a finding that this lack of knowledge contributed to a compliance failure for IT security controls related to privacy and data security. The auditors recommended that the company needed to improve its communication of policy changes and revisions to both employees and managers. The auditors also noted that Red Clay Renovations has been experiencing a great deal of change especially with respect to how the company protects information from unauthorized disclosures, including theft of data by cyber criminals. The company agreed with the finding and in its response noted that it has developed a substantial number of new and revised policies, plans, and guidance procedures to help manage the associated risks but that it could improve internal communications about those changes. Now, the company needs to fix the "communications" problem. The CISO has asked you to help develop a communication strategy that can be used to explain the cybersecurity and privacy related policies to a non-technical workforce.
Your Task: Prepare a briefing that identifies your top 5 strategies and explains why you chose each one. Provide examples of the types of policies which need to be communicated to the workforce (use your work for Projects 1, 2, & 3 and your weekly discussion papers). To help you get started, the CISO has suggested that you consider the following methods when developing your communication strategy.
1. distribution of printed copies of the policies,
2. email distribution,
3. web links to an internal Website,
4. face-to-face briefing of field office staff and managers (with or without Question & Answer session),
5. a company newsletter
Describe first and second generation cpted
: Describe 1st and 2nd generation CPTED, how they differ, and how they complement each other. Using the 3Ds concept of CPTED, describe how they function
|
Rewarded for systematic or unsystematic risk
: a. Portfolio A contains stocks A and B. Stock A and B are perfectly positively correlated. Portfolio B contains stocks D and E.
|
Explain the use of construction information in the context
: Explain the use of construction information in the context of a project and Describe the different types of construction information and their uses
|
Discuss the five processes of project management
: Discuss the five (5) processes of project management. As a manager, how would one plan, track, and manage projects, and what software could one use
|
Prepare a briefing that identifies your top five strategies
: Prepare a briefing that identifies your top 5 strategies and explains why you chose each one. Provide examples of type of policies which need to be communicated
|
Create a business plan for T-Mobile
: Using the data that has been provided, create a business plan for T-Mobile - Includes the financial position of each company
|
Influence of organizational principles on communication
: Discuss the influence of organizational principles on communication, facilitation, collaborative planning, and decision-making.
|
Calculate the monthly percentage returns for wbc
: Part a. of this question, calculation of tax effects and incremental cash flows, can be set up using excel. However, after you construct your table in Excel ple
|
What arethe decision makers values and objectives
: What arethe decision maker's values and objectives? List all alternatives or options - including ones that she may not have considered.
|