What is meant by cybersecurity for critical infrastructure

Assignment Help Management Information Sys
Reference no: EM132305895

Assignment

You are working for the Chief of Staff (CoS) for a newly elected Governor. The governor asked the CoS to research and prepare a 5 to 7 paragraph background briefing (backgrounder) that addresses the question below. This background briefing will be used to help prepare the Governor and his appointed cybersecurity director as they answer questions from the press and general public.

As governor, how will your administration improve cybersecurity for the state's Critical Infrastructures?

The CoS has asked you to research and prepare a draft for the background briefing. Your draft must provide enough information that the CoS and the Governor understand key terms that you will be using in your explanations. To that end, your draft briefing must answer the following questions:

•What is meant by "cybersecurity" for critical infrastructures?"

•What is meant by "Threats" (i.e. individual hackers, politically motivated hacktivists, criminal enterprises, and unfriendly "nation state" actors), countermeasures, and safeguards?

•What are the three most important actions that the governor's administration should take to help improve the security of critical infrastructures in the state? (You should identify and discuss these in greater detail than your response to the first two bullet points.)

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Project : Solving the Cybersecurity Workforce Crisis

For this project, you will be researching and reporting on the cybersecurity workforce crisis as it affects state governments. Your audience will be the members of an organization for state government officials such as the National Governor's Association and the National Association of State Chief Information Officers. The results of your research project will be used to help develop a one-day workshop on strategies for developing and growing the cybersecurity workforce at the state government level.

Research:

1. Read / Review the Week 5 readings.

2. Research authoritative sources which discuss the reasons why the cybersecurity workforce crisis exists.

3. Review the best practice recommendations from the NICE report. Select three to five best practices which state governments could benefit from implementing.

4. Review alternative recommendations for attracting and retaining qualified talent (workers) to a state or region. Select 3 or more which you believe would be beneficial for state government hiring efforts for cybersecurity personnel.

a. 7 Ways to Attract and Retain Talent (without having to compete on salaries)

b. Government Needs to Rethink How They Attract IT Talent

c. Desperate for Cybersecurity Workers, States Help Build the Next Generation

d. About Good Neighbor Next Door (ask yourself if this program or something similar should be extended to cybersecurity personnel)

5. A separate closing section in which you summarize your research and recommendations.

Write:

Write a three to four page research report which includes a summary of your research, findings, and recommendations. At a minimum, your paper must include the following:

1. An introduction or overview of the cybersecurity workforce issues which impact State governments. This overview should address the political, economic, socio-cultural (including education), and technological factors which contribute to the perceived lack of qualified cybersecurity workers. This introduction should be suitable for an executive audience.

2. A separate section which addresses three to five specific reasons why states have difficulty hiring a sufficient number of trained and qualified cybersecurity workers for positions in state agencies and offices.

3. A separate section which addresses three to five specific "non-cybersecurity" reasons why a workforce shortage affecting state governments may currently exist.Consider and discuss whether or not the workforce shortage arises out of state budget problems rather than training and education or salary.

4. A recommendations section which identifies and discussesat least five training, education, marketing or hiring actions which state governments could take to attract cybersecurity talent and reduce or alleviate a cybersecurity workforce shortage for trained and qualified cybersecurity personnel. These recommendations should include several alternative practices which deemphasize salary.

5. A separate Summary section in which you present a summary of your research and recommendations.

Reference no: EM132305895

Questions Cloud

Discuss the growing risks associated with adoption : Prepare a newsletter article in which you identify and discuss the growing risks associated with adoption of mobile applications.
Autozone have good strategy for growth : Based on Michael Porter's discussion of the characteristics of an effective strategy, does AutoZone have a good strategy for growth? Explain.
Five steps of the strategic-management process : To what extent is AutoZone following the five steps of the strategic-management process?
Evaluate how the mining group gold process : Evaluate how the Mining Group Gold process could improve teamwork, empowerment, and effective communication.
What is meant by cybersecurity for critical infrastructure : What are the three most important actions that the governor's administration should take to help improve the security of critical infrastructures ?
Require managerial attention and strategy : Identify and describe the significance of at least five legal issues that require managerial attention and strategy.
How do human being constitute themselves as subjects : How do human being constitute themselves as subjects ? How does complexity impact which selves are sampled?
How are social power and persuasion tactics related : How are social power and persuasion tactics related? Which of the following is a non-programmed decision?
Research best practices for it security : You may choose any two states' IT Security Policies from the list published by the Multi-State Information Sharing and Analysis Center (MSISAC).

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analyze all of the costs and benefits of outsourcing it

Analyze all of the costs and benefits of outsourcing IT, and present at least four well-supported reasons why the company should keep the department. Using all of your knowledge up to this point and any external sources necessary, create a present..

  How medical education compares to training received in us

How medical education, job duties, and pay in the country of your choice compares to the training and experience received in the United States.

  How organisational issues impact the data analytics

ITECH7406- Business Intelligence and Data Warehousing assignment. How cultural and organisational issues impact the data analytics

  Prepare a plan to communicate with key stakeholders

Apple is about to release its latest technology. The company needs to prepare a plan to communicate with key stakeholders about the release.

  Identify whether you have an anti-virus software running

Identify whether you have an anti-virus software running on your machine and from which company. Instructions on locating anti-virus and firewall software.

  Requirement of an effective solution to interoperability

Determine the most significant requirement of an effective solution to interoperability. Provide a rationale for your determination

  List three immediate impacts that may be felt by it

Choose a law or regulation (new or revised version) and list three immediate impacts that may be felt by IT and require organization compliance.

  Define how many people you plan to hire

Develop an executive proposal (document, Powerpoint deck, etc.). Define how many people you plan to hire and Skills you are looking for Would they each have specialties or similar divided skills

  Health care information technology

Health care information technology - information technology act change the world of Medical Information Technology

  Example of this issue which has happened to you

Commitment: A Cautionary Tale and provide an example of this issue which has happened to you - you are required to write an initial post

  Describe your experience with the web-based ehr

Describe your experience with the Web-based EHR.What impressed you about the Web-based EHR?

  A contract for the purchase of a technology system

Write a paper discussing the three areas typically addressed in a contract for the purchase of a technology system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd