Why did you select that piece of advice

Assignment Help Computer Engineering
Reference no: EM133482149

CASE SCENARIO: One month into her new position at Random Widget Works, Inc., Iris Majwubu left her office early one afternoon to attend a meeting of the local chapter of the Information Systems Security Association. She had recently been promoted from her previous assignment at RWW as manager of information risk to become the first chief information security officer to be named at RWW.

This occasion marked Iris's first ISSA meeting. With a mountain of pressing matters on her cluttered desk, Iris wasn't exactly certain why she was making it a priority to attend this meeting. She sighed. Since her early morning wake-up, she had spent many hours in business meetings, followed by long hours at her desk working toward defining her new position at the company.
At the ISSA meeting, Iris saw Charlie Moody, her supervisor from Sequential Label and Supply, the company she used to work for. Charlie had been promoted to chief information officer of SLS almost a year ago.

"Hi, Charlie," she said.
"Hello, Iris," Charlie said, shaking her hand. "Congratulations on your promotion. How are things going in your new position?"
"So far," she replied, "things are going well-I think."
Charlie noticed Iris's hesitancy. "You think?" he said. "Okay, tell me what's going on."

"Well, I'm struggling to get a consensus from the senior management team about the problems we have," Iris explained. "I'm told that information security is a priority, but everything is in disarray. Any ideas that I bring up are chopped to bits before they're even taken up by senior management. There's no established policy covering our information security needs, and it seems that we have little hope of getting one approved anytime soon. The information security budget covers my salary plus a little bit of funding that goes toward part of one position for a technician in the network department. The IT managers act like I'm wasting their time, and they don't seem to take our security issues as seriously as I do. It's like trying to drive a herd of cats!"

Charlie thought for a moment and then said, "I've got some ideas that may help. We should talk more, but not now; the meeting is about to start. Here's my new number-call me tomorrow and we'll get together for coffee."

Charlie and Iris met for a working lunch. "First thing you need to do," Charlie told Iris, "is gain some consensus from your higher management to fund a new position for a security analyst. Then fill it by finding someone who knows the security skills but is primarily skilled in project management. Or find a strong security analyst and send them off for PM training." "Why so?" Iris asked. "A good project manager can help the entire team learn how to manage all the security projects to keep you from getting overwhelmed with deadlines and deliverables," Charlie said, smiling. "A good PM can make your operations proactive rather than reactive."
"That sounds good," Iris replied. "What else do I need to know?"

Questions:

Based on your reading of the chapter and what you now know about the issues, list at least three (3) other things Charlie could recommend to Iris.

From your understanding of the material presented in this unit, what do you think is the most important piece of advice Charlie gave Iris? Why did you select that piece of advice?

Reference no: EM133482149

Questions Cloud

What is the sales amount for the central region : created as part of the IS Reporting Cube. What is the Sales (account 4000) amount for the Central Region in 2020 using Actual for the Version
What market structure best describes the market : What market structure best describes this market? What evidence do you have to support your conclusion? What external forces act upon firms in the industry?
Provide separate network firewall hardware device in diagram : CSCI 106- Provide a separate network firewall hardware device in your diagram. Locate the firewall between the ISP WAN device and the LAN router.
Which metric is the most effective and why : Why are metrics important, from a business point of view? The textbook describes three agile metrics. In your opinion, which metric is the most effective
Why did you select that piece of advice : what do you think is the most important piece of advice Charlie gave Iris and Why did you select that piece of advice
What are the advantages and disadvantages of ensemble models : What are the advantages and disadvantages of ensemble models? List and briefly describe the nine-step process in conducting a neural network project.
How can you determine when it is appropriate : What are the chief differences between these three data structures? How can you determine when it is appropriate
What are some important security controls to put in place : What are some important security controls to put in place when implementing a cloud-based application? What kinds of considerations and features would you look
Comparing twitter and facebook user behavior : How similar or different are the findings of the paper and the article in regard to privacy? Why, in your opinion, is there a similarity or difference between

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain PCI compliance to the database administrator

In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.

  Discuss employ firewalls to mitigate insider threats

How would you employ firewalls to mitigate insider threats, Why would your approach work

  Should warehouse be included why or why not

The company for whom they are developing the system has just one warehouse location. Should "warehouse" be included? Why or why not?

  Identify the potential consequences to the stakeholders

Identify the potential consequences to the stakeholders of accepting this aggressive bid and risks involved in this project.

  According to return-on-investment analysis which candidate

you are designing a web-based system where your regional offices can submit their sales reports online instead of

  Create a web page by using html to format text

Create a web page by using HTML to format text. Use basic elements and attributes in the creation of web pages.

  Calculate the average score for each student in the class

Your program will ask the user to enter the number of students in the class and the each student has 3 exams taken.

  What was walgreens entry strategy designed to achieve

Modes of entry into an international market are the channels which organizations employ to gain entry to a new international market. Within our Thompson.

  What types of data are collected by retail stores

What differences are there be between online and in-person sales data? How does this data give them a business advantage?

  How to using the prompt and alert functions

compute the average (mean) of the 5 marks as a rounded integer or a floating point number.

  What methods and models can be used by organizations

What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will.

  Develop a risk management framework using given details

As indicated above, if Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd