What would you give to rob and chris

Assignment Help Computer Engineering
Reference no: EM133210517

Case: You are Megacorp's new Chief Information Security Officer. You spent your first three days going through the HR onboarding process, meeting your various colleagues in the IT department, getting a tour of the PA facility, and setting up your company computer. On Thursday, Brenda and you took a road trip to visit the Fairfax, Virginia location where you met the Chief Technology Officer and the Director of Engineering. You spent most of Friday moving from office to office in the executive suite, meeting different department heads, including the CFO, General Counsel, Director of Sales, etc. Basically, you haven't really had time to do anything substantive.

On Monday morning, Brenda and Rob show up at your door shortly after you arrive. Rob says "Chris, there is a Board meeting at the end of next week. The Board knows you started (they authorized us creating your position), and they are very anxious to see what you have planned. So, please put together an outline of what you think Megacorp needs to do. I know you're still new and learning your way, but the Board expects at least a basic outline. Please put together what you can, and then circulate it to Brenda and me for review."

Question: In 500 words or less, what would you give to Rob and Chris for the Board of Directors? That is, given that Megacorp does not have a cybersecurity program, what steps should Megacorp take to create a program?

Reference no: EM133210517

Questions Cloud

Evaluation techniques which would be appropriate : Evaluation techniques which would be appropriate for evaluating the interface on an air traffic control and explain TWO (2) of the evaluation techniques
Concept of asymmetric information : Discuss quality asset transformation. What is The concept of asymmetric information and moral hazard.
Identify two firms in two different industries : Nimble Operations Discussion - Identify two firms in two different industries that you believe exhibit a nimble nature in their operations
Example of a custom table cell with placeholders : Describe with examples the difference between each instance including memory allocation in swift
What would you give to rob and chris : What would you give to Rob and Chris for the Board of Directors? That is, given that Megacorp does not have a cybersecurity program, what steps should Megacorp
Discuss responsibility of google corporate leadership : Discuss with examples the role and responsibility of "Google" corporate leadership in driving strategies, fostering culture of innovation.
Automate the infrastructure using terraform : You are asked to automate the infrastructure using Terraform first and install other required automation tools in it - DevOps methodology and in order
Calculate tax and net_salary : Calculate tax and net_salary and print the information of all employees in formatted output.
Describe organizations management : Describe how your organization's management should work with the stakeholders that are in each group.

Reviews

Write a Review

Computer Engineering Questions & Answers

  For what fraction of time does the email application need

Consider the hierarchical network in Figure 5.30 and suppose that the data center needs to support email and video distribution among other applications.

  What are some of the security risks and issues

Describe what IoT is; what are some of the security risks and issues with IoT devices; what steps can be taken to mitigate these risks?

  Where do the data for business analytics come from

Where do the data for business analytics come from? What are the sources and the nature of those incoming data? What are the most common metrics that make.

  What determines whether a curve shifts in the solow diagram

What determines whether a curve shifts in the Solow diagram? Make a list of the parameters of the Solow model, and state whether a change in each parameter.

  Program requests the name of food and number of calories

The council suggest that at most 30% of the calories in our diet come from fat. however food labels give the number of calories and amount of fat per serving, they often do not give percentage of calories from fat.

  Describe the general information security steps and controls

Describe the general Information Security steps and controls that you would recommend to the Board to secure the Hybrid Cloud

  Create a program that takes in the a year from the user

Extend either the array-based implementation or the linked-list based implmentation of the queue to include a public String toString() method .

  What about the product of given matrix

Show that the eigenvalues of MMT are the same as that of MTM. What about the product of an n × m and m × n matrix, where n « m?

  Write a function to find a superpeak element in an array

Write a function to find a superpeak element in an array. A superpeak element is an element that is greater than the sum of its neighbors.

  Dynamic instruction scheduling

draw the flow-dependence graph for these instructions - leaving everything else unchanged. Unroll the loop three times. If one reschedules the unrolled loop

  CS140 Computer Programming I Assignment Problem

CS140 Computer Programming I assignment help and solutions, Saudi Electronic University, assessment help - Create a java program for Student profile with.

  Give user 3 chances to enter a secret password

Write a program that will give user 3 chances to enter a secret password, which is "PROUD". If the user fails the program will print "Wrong Password!

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd