Create a presentation for the next board meeting

Assignment Help Management Information Sys
Reference no: EM132219941

As cybersecurity manager you are responsible for staying up-to-date with laws that may affect ABC organization legally.

Your CISO has asked you to create a presentation for the next board meeting where you will present information about this act and how it could affect your organization which is a software company which specializes in multimedia applications which can be  downloaded or accessed for a subscription via the web.

The company accepts payment cards as a form of payment. Create a PowerPoint® narration (voice) report of at least 10 slides based on your findings about this law (not including the cover page and reference page).

If you do not own a copy of Microsoft PowerPoint use a comparable slide software or Google Slides (free and accessible from Google.com). If your tool does not offer the ability to put audio on the slides utilize another tool to record the audio portion, i.e., VLC Media or another tool that will allow you to record .mp3 file format that transitions with the slides.

In the presentation, address the following:

1. Relate a real-world case study on the Payment Card Industry Data Security Standard (PCI DSS) standard noncompliance and its implications

2. Distinguish how the Payment Card Industry Data Security Standard (PCI DSS) is a standard and not a law, and how it defines requirements for information systems security controls and countermeasures.

3. Review a case study on a credit card transaction-processing company's noncompliance with the Payment Card Industry Data Security Standard (PCI DSS) and identify the privacy data breach that occurred:

• History of the law

• ABC's responsibility under this law

• What is ABC's liability for failing to follow this law?

4. Recommend a PCI DSS-compliant mitigation remedies to prevent the same loss from occurring again at a similar organization.

Make sure to provide a reference slide that provides APA citations of any sources used in the PowerPoint presentation. This slide does not require narration.

Attachment:- Case Study on PCI DSS.rar

Reference no: EM132219941

Questions Cloud

Explain effective methods of communicating research findings : Poster presentations at conferences are effective methods of communicating research findings. The discussion of the research being presented is a key element.
Why do you think your chosen theory has validity : There are several theories or perspectives of personality described in this week's readings. Choose one that appeals to you, research one idea from that theory.
Why is the given an ethical dilemma : In a minimum of 50 words, for each question, thoroughly answer each of the questions below regarding Case 7: Handling Disparate Information for Evaluating.
Discuss the challenges it divisions face : The IT compliance program cannot be conceived in isolation and devoid of the key links to non-IT and financial compliance.
Create a presentation for the next board meeting : Create a presentation for the next board meeting where you will present information about this act and how it could affect your organization.
Explain any recommendations for interventions : Provide a brief summary of what you have learned about the individual reviewed in the case. Include information about the individual in terms of demographics.
Discuss about neuropsychological assessment instrument : Select a neuropsychological assessment instrument and prepare a 2 -slide Microsoft PowerPoint presentation, including detailed speaker notes.
Compare the elected and appointed leadership positions : Discuss how the form of government differs in terms of the influence that may be applied to an elected versus appointed leader.
Determine which type of network flow can be used to model : Determine which type of network flow can be used to model each of the problem scenarioslisted below.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How objection make calculating utility or good difficult

Does the end justify the means? Pick two of the objections. Discuss how these objections make calculating utility or "good" difficult.

  Analyze the common threats-vulnerabilities to data systems

Analyze the common threats/vulnerabilities to data systems such as web applications and data servers

  Technology on business communicationsidentify as many

technology on business communicationsidentify as many business communications technology applications as possible. for

  Illustrate the concepts from your written report

Summarize the paper and share your key ideas, via a PowerPoint presentation, with the CTO and steering committee of the organization.

  Complete the risk management section of project plan

Complete the Risk Management section of your Project Plan - Risk Management section of your project plan outline and updates - The complete risk table is presented. Name of risk, category, probability and impact are provided.

  Functions and comparisons of mdm softwareusing your

functions and comparisons of mdm softwareusing your favorite search engine locate various types of mdm software. choose

  Discuss the ethical issues of social networks and anytime

What are the four primary factors described in the text that set the state for Web 2.0 or the social Web that we enjoy today?

  Discuss ways in which the changes will be implemented

The owner was impressed with your presentation last week and is willing to move forward with the implementation of the new information system. Discuss ways in which the changes will be implemented

  Stems analysis and design assignment

Visit a public place where information is being exchanged and transactions are taking place. It could be a coffee shop, a restaurant, a retail store

  Create a page professional memo about your assessment

In this phase, you need to communicate with your troops about the National Infrastructure Protection Plan, through your information in the memo.

  How many different binary search trees

How many different binary search trees can store the keys {1,2,3,4}?

  How much will it cost to use the system

What does CIC need to do to be able to start using the system? How much will it cost to use the system?How will the configuration be done and by whom?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd