Describing your selected organizations security posture

Assignment Help Management Information Sys
Reference no: EM13751464

Security Analysis Findings and Recommendations Overview - For the first project, you researched the impact of legislation on your selected organization information security program.

For the second project, you researched information security standards used by your selected organization. For the third project, you created a sample cyber security profile addressing the security posture of your selected organization. This final project incorporates the results from the first three projects into a final security analysis.

For this final project, you will create an executive summary presentation describing your selected organization's security posture and your recommendations for improvement. You will also write a memorandum outlining your findings and your recommendations. Think of this assignment in terms of your own job. Apply the same standards and professionalism you would use for your superiors.

Learning Objective - After completing this project, students will be able to create an executive level presentation,

2) write an executive level memorandum, and

3) combine seven weeks of learning material into a final product.

Media - Students will use the Internet, Microsoft PowerPoint, and Microsoft Word. Students will utilize their first three projects and all learning material from the past seven weeks.

Deliverables - There are two (2) deliverables for this project. Submit your presentation and memorandum to the appropriate assignment area by the due date.

1. Your final presentation should be between 15 - 20 pages. Your executive summary presentation, at a minimum, should 1) cover the impact of legislation on your organization (3-4 slides), describe the information security standards applicable to your organization (3-4 slides), and 3) summarize the key elements of your organization's cyber security profile (findings/recommendations) (3-4 slides). You should also have a cover slide, an agenda slide, a summary/conclusion slide(s), and a reference slide (using proper APA guidelines). Use the notes pages to complete the slides. Your presentation and notes pages should stand alone so that you do not have to "present" the slides for the reader to understand your intent.

2. Your executive summary memorandum should be a least two (2) full pages, double-spaced, 1-inch margins, and New Times Roman 12-Pitch font. Memorandums not meeting the two full-page minimum will lose points. Your memorandum should, at a minimum, include a summary of the three (3) major areas of your executive presentation.

Reference no: EM13751464

Questions Cloud

Evaluate the current network topology : Explain the network's fundamental characteristics and components. Evaluate the current network topology. Describe the standards applicable to this project
Organization benefits from operational planning : Discuss how an organization benefits from operational planning, and how operational planning and budget planning are related. Explain how "system thinking" improves operation decision making.
Write an essay on debt assumption and the jay treaty : Write an essay on Debt assumption, The Jay Treaty, The Alien and Sedition Acts, The Election of 1800, John Marshall's use of judicial review, The Louisiana Purchase and The trial of Aaron Burr.
Determine the average operating ratio for a savings : Which variables is/ are statistically significant in explaining variations in the average operating expense ratio - what type of cost-output r/ship is suggested by these statistical results?
Describing your selected organizations security posture : create an executive summary presentation describing your selected organization's security posture and your recommendations for improvement
Purchase and the sale of securities : The advance/decline line is be used to time both the purchase and the sale of securities.
Describing your selected organizations security posture : create an executive summary presentation describing your selected organization's security posture and your recommendations for improvement
Explain the relationship between logistics systems and cost : Explain the relationship between logistics systems and cost and Explain the strategic role competitive, product, and spatial relationships play in logistics
Write an essay on edmund gettier : Write an essay on Edmund Gettier stated that knowledge is justified true belief. First, can you have knowledge if the proposition in question is merely true belief?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Wal-marts use of technology in logistics and does wal-mart

wal-marts use of technology in logistics and does wal-mart use it effectively in its logistical operations?it discusses

  Definition of maturity level in the software processdefine

definition of maturity level in the software processdefine maturity level in the software process maturity level.

  Types of security threats to it

Information Security : explained - Access controls are good things and should be secure, but programmers continually add "backdoor access" to their programs. Is a good or a bad practice?

  Explain about end-user development tools

End-user development tools - The pitfalls of the end-user development tools can sometimes outweigh its advantages. Do you agree?

  Impact of it on your organization''s supply chain

What is the impact of IT on your organization's supply chain? What are some specific areas where speed, agility, and responsiveness have been improved because of advances in IT

  What is the most effective way to identify risks

What is the most effective way to identify risks and What are some important factors when weighing the depth of a formal risk analysis

  Software solutionssales mitch vp of bead bar on board

software solutionssales mitch vp of bead bar on board develop a software which can use on handheld computer. i think

  Federal communications commission fcc mission structure how

federal communications commission fcc mission structure how it regulates or influences use and design of

  Mis security measures tools and strategiesassume that you

mis security measures tools and strategiesassume that you have been asked to consult for a company that has branch

  Using the internet to gain competitive advantageessay 250

using the internet to gain competitive advantageessay 250 words. explain how internet can help a company to achieve a

  Briefly describe the enterprise

Briefly describe the enterprise, in terms of its operations, products/services, markets, competitors etc.

  Describing various event categories

Write a two-and-a-half-page report describing various event categories and event-based transactions that are used by the network management systems to bring an alarm, event, or alert to the network manager's attention

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd