Rewrite information security policy to current industry

Assignment Help Management Information Sys
Reference no: EM131189200

When you stepped into your role as a new CIO, you became responsible for the well-being of an organization, not just the IT organization. Some aspects of this organization may be strong, while others are weak. It is easy to focus on only the weaknesses when you consider how to improve the organization. These are the areas where the organization most needs change, and where the changes will have the greatest effect.

Do not ignore the organization's strengths when you plan for change. These areas of strength derive from the organization's "culture" and earlier operating history. Consider how each change is likely to be perceived, and what effect it would have on the culture, before you propose it.

To prepare for this Assignment, review the organization's Information Security Policy document you received in Week 1. Identify aspects of the policy that provide insufficient guidance for the organization, using your experience with the security incident as a guide. Research the course learning resources, Walden University Library, and web to identify industry best and typical practices for each of these aspects.

Rewrite the information security policy to reflect current industry practices in a way that is appropriate for the organization. Remove obsolete content, revise outdated material, and add sections to reflect current technology. Strive for clarity and an appropriate level of detail throughout.

Outline a plan to migrate the organization from its current practices to the new ones. Estimate the necessary budget and schedule and make a cost-benefit argument for adopting the new policy.

The final step is to introduce the changes to the organization. Draft two memos-one to the CEO and your C-level peers, the other to the staff-to introduce the new information security policy.

  • New policy: Rewrite the information security policy to reflect current industry practices in a way that is appropriate for the organization. Remove obsolete content, revise outdated material, and add sections to reflect current technology. Strive for clarity and an appropriate level of detail throughout.
  • Migration plan: Outline a plan to migrate the organization from its current practices to the new ones. Estimate the necessary budget and schedule and make a cost-benefit argument for adopting the new policy.
  • Memos: Draft two memos-one to the CEO and your C-level peers, the other to the staff-to introduce the new information security policy.

You must submit the following:

-Security Incident Logbook

-Revised/updated Information Security Policy

-A plan to roll out the policy to the organization that includes end-user training

-Memos to the executives and staff, including:

  • The root cause of the incident
  • How it was resolved
  • The plan that has been put in place to prevent a future compromise
  • A rationale for the new policy and benefits.

Attachment:- Assignment.rar

Reference no: EM131189200

Questions Cloud

Prove by rational demonstration and econometric verification : They are inherently opposed to the legitimacy of compara. five economic systems in the long run, because this suggests that there exists not one, bui many "natural laws." Apply the lessons developed in chapter 1 about "existence" anc culture to aw..
Attitudes on a variety of subjects : An annual survey of first-year college students asks 273,000 students about their attitudes on a variety of subjects. According to a recent survey, 51% of first-year students believe that abortion should be legal. Use a 0.05 significance level to ..
Determine the optimal order quantity : A toy manufacturer uses approximately 32,000 silicon chips annually. - Determine The optimal order quantity. - Determine The number of workdays in an order cycle.
Expect to be the limiting value of c : (a) What is the average yearly rate of change of carbon-14 during the first 5000 years? (Round your answer to six decimal places.) g/yr (b) How many grams of carbon-14 would you expect to find remaining after 2005 years? (Round your answer to two de..
Rewrite information security policy to current industry : New policy: Rewrite the information security policy to reflect current industry practices in a way that is appropriate for the organization. Remove obsolete content, revise outdated material, and add sections to reflect current technology. Strive for..
How do we define quality within healthcare : Discuss how Quality has evolved over time in various industries to what it is today. Be sure to discuss landmark quality models and the individuals who discovered and pioneered those models.
Construct a cumulative frequency distribution of this data : The number of families who used the Minneapolis YWCA day care service was recorded over a 30-day period.- Construct a cumulative frequency distribution of this data.
What additional information might you seek : You are the controller of ABC manufacturing corp, a publicly traded furniture manufacturing company, based on Long Island. Business has been going well for ABC. Over the last four quarters the EPS have been 50, 54,59, and 60 cents per share. What cou..
Evalute microsofts strategy in good and poor economic times : Evalute Microsoft's strategy in good and poor economic times. ---  Discuss the pros and cons of Microsoft's most.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Performanc survey wgraphic display of results1 using a

performanc survey wgraphic display of results1. using a microsoft word document create a short survey based on a topic

  Important information about information security

Important information about Information Security - Analyzes available technological and procedural mitigants, identify best practices; and frame your plan to manage the risks.

  Lean supply chain implementation and risksit is possible to

lean supply chain implementation and risksit is possible to implement a lean supply chain while using a global supply

  Discuss if think terminating a employee for policy violation

Discuss if you think terminating an employee for a policy violation is justified. Which policies would you fire someone over, which would you provide a warning first?

  Integrative network design

Integrative Network Design

  How to maximize communication systems within an

how to maximize communication systems within an organizationwhen management communicates he or she is sharing

  Describe the organizations important business processes

Describe the organizations important business processes - Describe the organizations structure and suggest strategic information systems appropriate for that particular business. including those based on Internet technology.

  Define the project in terms of the selected framework

Define the project in terms of the selected framework. Discuss advantages for using the selected framework. Discuss integration challenges that were highlighted by defining the framework.

  Compare and contrast database backup & disaster planning

This research paper will describe, compare and contrast Database Backup & Disaster Planning. This research paper must be submitted using SafeAssign

  What are some specific tools organizations can use

What are some specific tools (IS or management) organizations can use to improve their business processes

  Organizations are becoming more socially conscience or

organizations are becoming more socially conscience or less?do you think organizations are becoming more socially

  Computer incident response team

Computer incident response team (CIRT) members are generally appointed by management and given authority to take action. Most often, this is performed by issuing a letter of appointment containing a list of names with associated with roles. Complete ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd