Why did you select that piece of advice

Assignment Help Computer Engineering
Reference no: EM133482149

CASE SCENARIO: One month into her new position at Random Widget Works, Inc., Iris Majwubu left her office early one afternoon to attend a meeting of the local chapter of the Information Systems Security Association. She had recently been promoted from her previous assignment at RWW as manager of information risk to become the first chief information security officer to be named at RWW.

This occasion marked Iris's first ISSA meeting. With a mountain of pressing matters on her cluttered desk, Iris wasn't exactly certain why she was making it a priority to attend this meeting. She sighed. Since her early morning wake-up, she had spent many hours in business meetings, followed by long hours at her desk working toward defining her new position at the company.
At the ISSA meeting, Iris saw Charlie Moody, her supervisor from Sequential Label and Supply, the company she used to work for. Charlie had been promoted to chief information officer of SLS almost a year ago.

"Hi, Charlie," she said.
"Hello, Iris," Charlie said, shaking her hand. "Congratulations on your promotion. How are things going in your new position?"
"So far," she replied, "things are going well-I think."
Charlie noticed Iris's hesitancy. "You think?" he said. "Okay, tell me what's going on."

"Well, I'm struggling to get a consensus from the senior management team about the problems we have," Iris explained. "I'm told that information security is a priority, but everything is in disarray. Any ideas that I bring up are chopped to bits before they're even taken up by senior management. There's no established policy covering our information security needs, and it seems that we have little hope of getting one approved anytime soon. The information security budget covers my salary plus a little bit of funding that goes toward part of one position for a technician in the network department. The IT managers act like I'm wasting their time, and they don't seem to take our security issues as seriously as I do. It's like trying to drive a herd of cats!"

Charlie thought for a moment and then said, "I've got some ideas that may help. We should talk more, but not now; the meeting is about to start. Here's my new number-call me tomorrow and we'll get together for coffee."

Charlie and Iris met for a working lunch. "First thing you need to do," Charlie told Iris, "is gain some consensus from your higher management to fund a new position for a security analyst. Then fill it by finding someone who knows the security skills but is primarily skilled in project management. Or find a strong security analyst and send them off for PM training." "Why so?" Iris asked. "A good project manager can help the entire team learn how to manage all the security projects to keep you from getting overwhelmed with deadlines and deliverables," Charlie said, smiling. "A good PM can make your operations proactive rather than reactive."
"That sounds good," Iris replied. "What else do I need to know?"

Questions:

Based on your reading of the chapter and what you now know about the issues, list at least three (3) other things Charlie could recommend to Iris.

From your understanding of the material presented in this unit, what do you think is the most important piece of advice Charlie gave Iris? Why did you select that piece of advice?

Reference no: EM133482149

Questions Cloud

What is the sales amount for the central region : created as part of the IS Reporting Cube. What is the Sales (account 4000) amount for the Central Region in 2020 using Actual for the Version
What market structure best describes the market : What market structure best describes this market? What evidence do you have to support your conclusion? What external forces act upon firms in the industry?
Provide separate network firewall hardware device in diagram : CSCI 106- Provide a separate network firewall hardware device in your diagram. Locate the firewall between the ISP WAN device and the LAN router.
Which metric is the most effective and why : Why are metrics important, from a business point of view? The textbook describes three agile metrics. In your opinion, which metric is the most effective
Why did you select that piece of advice : what do you think is the most important piece of advice Charlie gave Iris and Why did you select that piece of advice
What are the advantages and disadvantages of ensemble models : What are the advantages and disadvantages of ensemble models? List and briefly describe the nine-step process in conducting a neural network project.
How can you determine when it is appropriate : What are the chief differences between these three data structures? How can you determine when it is appropriate
What are some important security controls to put in place : What are some important security controls to put in place when implementing a cloud-based application? What kinds of considerations and features would you look
Comparing twitter and facebook user behavior : How similar or different are the findings of the paper and the article in regard to privacy? Why, in your opinion, is there a similarity or difference between

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd