Should you use nist cybersecurity framework

Assignment Help Computer Engineering
Reference no: EM133502667

Case Study: Policy Writing Approach (Santos, 2019)

Regional Bank has been growing rapidly. In the past two years, it has acquired six smaller financial institutions. The long-term strategic plan is for the bank to keep growing and to "go public" within the next three to five years. FDIC regulators have told management that they will not approve any additional acquisitions until the bank strengthens its information security program. The regulators commented that Regional Bank's information security policy is confusing, lacking in structure, and filled with discrepancies. You have been tasked with "fixing" the problems with the policy document.

Question: Research both implementations and answer the following questions:

  • Would you use any material from the original document?
  • What other materials should you request?
  • Would you want to interview the author of the original policy?
  • Who else would you interview?
  • Should the bank work toward ISO certification?
  • Which ISO 27002:2013 domains and sections would you include?
  • Should you use NIST's Cybersecurity Framework and related tools?

 

Reference no: EM133502667

Questions Cloud

Needing the visual of a cogs manufactured schedule : Cost of goods manufactured--schedule Rocketzz Company produces small gasoline-powered engines for model airplanes. Mr. Clemens, Rocket'zz CFO
What are some of the general factors that we must take : What are some of the general factors that we must take into account in order to control microorganisms in healthcare settings? Select ONE physical method
Can an organisation use more than one costing system : Explain if using volume-based cost drivers are relevant in the costing systems of 21st-century organisations - Can an organisation use more than one costing
Identify sources of conflict in health care decision making : Who will make decisions about AJ's care in the above scenario? Identify sources of conflict in health care decision making.
Should you use nist cybersecurity framework : Would you use any material from the original document? What other materials should you request? Would you want to interview the author of the original policy?
Discuss the safety and effectiveness of alternative : Discuss the safety and effectiveness of alternative and complementary medicine for the treatment of specific illnesses such as cancer, diabetes
How will you compare the before and after intervention : Which measurement tools are available for evaluation of your research? and/or How will you compare the before and after intervention?
Calculate xyz ltds profit for the month ending 31 march : Using the concepts of accrual accounting, calculate XYZ Ltd.'s profit for the month ending 31 March 2023
Explain to your human resources department : Explain to your Human Resources Department the importance of differentiating between the various payments made on termination of employment

Reviews

Write a Review

Computer Engineering Questions & Answers

  How many valid hosts can each customer actually allocate

What is the new submask in binary notation for each customer?How many valid hosts can each customer actually allocate?

  Complete the method below that will accept an array

Complete the method below that will accept an array of Strings as a parameter and search through the array for a word containing "dog". If it finds the word

  One of the issues with the component object model com was

research available test case software. what are some features offered by the majority of the products?discuss the

  Determine the type of triangle for the given lengths

Write a program that determines the type of triangle for the given lengths of the sides the triangle does not exist.

  Explain why you are emailing and other relevant information

Explain why you are emailing and other relevant information. Include a brief subject line which reflects the content of the email. Include a greeting like you would in a business letter.

  Difference between odbc and jdbc database interfaces

Why is it important to have effective and powerful interfaces like these for databases.

  What are the differences between static and dynamic RAM

What are the differences between static and dynamic RAM? What improvements are offered by synchronous DRAM compared with ordinary DRAM?

  Overview of the cryptography domain

Overview of the Cryptography Domain, Describe the operation of a one-time pad (OTP) and give an example of a device that uses an OTP from research

  Describe an instance when you heard or told a powerful

describe an instance when you heard or told a powerful story in a leadership position? how did it influence you? what

  What role should platform providers play in social discourse

Do these technology companies have an obligation to understand the impacts they are having on society? Do they have a responsibility to participate?

  Which wireless technology can transmit through solid objects

Which wireless technologies can transmit through solid objects? Which wireless technologies cannot?

  What kinds of features should look for in computer forensics

What kinds of features should you look for in computer forensics software? Do some investigating of your own to find what you believe to be the forensic tools.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd