Reference no: EM131218114
Project- HHS Security and Improvement Recommendations CSIA
Overview
For the first project, you researched the impact of legislation on the selected organization's information security program. For the second project, you researched information security standards used by the selected organization. For the third project, you created a sample cybersecurity profile addressing the security posture of the selected organization. This final project incorporates the results from the first three projects into a final security analysis. For this final project, you will create an executive summary presentation describing the selected organization's security posture and your recommendations for improvement. You will also write an executive memorandum outlining your findings and your recommendations. Think of this assignment in terms of your own job. Apply the same standards and professionalism you would use for your superiors.
Learning Objectives
After completing this project, students will be able to
1. Evaluate the security posture of the organization and communicate the findings in an executive-level summary presentation and briefing memorandum.
Deliverables
There are two deliverables for this project. Submit your memorandum to the appropriate TurnItIn assignment area by the due date. Submit your presentation to the LEO classroom by the due date.
Executive Presentation:
Your final executive summary presentation should be 15-20 pages. Your executive summary presentation, at a minimum, should
1. cover the impact of legislation on your organization (3-4 slides)
2. describe the information security standards applicable to your organization (3-4 slides)
3. summarize the key elements of your organization's cybersecurity profile (findings/recommendations) (3-4 slides)
4. You should also have a Cover slide, an Agenda slide, a Summary/Conclusion slide(s), and a References slide (using proper APA guidelines).
5. Use the Notes pages to complete the slides. Your slides and notes pages should stand alone.
6. Give your presentation using one of two options:
7. Use the record/embed audio feature of PowerPoint and give your presentation. Post your presentation to the classroom assignment area.
8. Use a video recording tool (i.e., Screen-cast-o-matic) of your choice to record yourself (do not need to see your face) giving the presentation. Upload the video to YouTube. Post the presentation and your YouTube URL to the classroom assignment area.
Executive Memo:
Your final executive summary memorandum should be at least two full pages, double spaced, 1-inch margins, in New Times Roman 12-pitch font. Memorandums not meeting the full two-page minimum will lose points. Your memorandum should, at a minimum, include a summary of the three major areas of your executive presentation (see above).
Write the code to call a function whose name
: Write the code to call a function whose name is send_number. There is one argument for this function, which is an int. Send 5 as an argument to the function.
|
How is the unix system call read actually invoked
: In Unix-like operating systems, there is both a API library function named read(), and asystem call referred to as read in the Unix documentation. However, Unix system calls do notactually have names like a library function does.
|
Compare the impact of foreign aid on their broader economies
: Essay topics for PUBH5752. There is considerable debate around the benefit of foreign aid for health outcomes in developing countries, particularly with regard to sustainability of programs. Select at least 2 recipient countries and compare the im..
|
Are the weights the same on earth and the moon
: If the mass of a sliding block is tripled while a constant net force is applied, by how much does the acceleration decrease? Explain the difference between a vector and a scalar quantity. Give at least two examples of different variables that are v..
|
Evaluate the security posture of the organization
: Evaluate the security posture of the organization and communicate the findings in an executive-level summary presentation and briefing memorandum.
|
What is the wlan topology in use
: Based on the figure below, what is the WLAN topology in use? In what way does the ISM band impact the topology? What must be done to ensure proper coverage of voice and video applications in the network?
|
How much does the public policy issue cost americans
: Describe and analyze the scope of the public policy concern. Be sure to address the following in your analysis.
|
The most valuable lesson from quarter
: Why do people often settle for something less than excellent?- What rewards can a person receive by creating excellence at work and in life?
|
What is the level of impact if the information label is low
: What is the level of impact if the information label is LOW? What is the primary purpose of the Framework for Improving Critical Infrastructure Cybersecurity? Who provides and independent assessment of the security plan?
|