Evaluate whether the management processes utilized

Assignment Help Computer Engineering
Reference no: EM133541815

Discussion Post: Cyber Security

Question I

Unit 1 focused on various leadership roles and their respective responsibilities in implementing an effective cybersecurity governance plan. Consider the leadership roles in your chosen organization (your own organization) and their responsibilities in implementing the organization's cybersecurity strategy:

1. Drawing on your learnings from this module, explain the organization's governing structure, and its approach to cybersecurity (as detailed in its policies and, where possible, observed in practice). If you are focusing on Sony, you may extrapolate the formal roles from the data available (in the case study and from your own research) and contrast this with what was observed.

2. Based on your substantiation above, recommend changes that should be implemented and, if applicable, propose a new cybersecurity leadership plan that addresses its shortcomings.

Question II

Unit 2 of this module described the management processes organizations should consider when developing a cybersecurity governance plan. Identify the steps your organization is taking to implement the management processes discussed in the Unit 2 notes, and address the following:

1. Evaluate whether the management processes utilized by your organization are sufficient to ensure good cybersecurity governance; and

2. Based on your substantiation above, recommend management processes for implementing a cybersecurity governance plan.

If you are using Sony as your chosen organization:

1. Evaluate why the management processes utilized by Sony were insufficient to ensure good cybersecurity governance; and

2. Based on your substantiation above, recommend management processes that would have addressed Sony's shortcomings in implementing a cybersecurity governance plan and should be adhered to going forward.

Question III

Unit 3 focuses on the importance of keeping an organization's cybersecurity awareness updated. To do so, the notes described the types of security awareness training that are available and the topics that should ideally be included in training programs. In your answer, address the following:

1. If relevant, identify any cybersecurity awareness programs or practices utilized by your organization or Sony, and evaluate whether they sufficiently cover the recommended topics mentioned in the Unit 3 notes.

2. Based on your substantiation above, provide an outline of a cybersecurity awareness program you would suggest for your chosen organization or Sony.

3. Your outline of the training program should cover the following four aspects:

• The type of security awareness training (classroom or online);
• The topics included in the training program;
• The target audience; and
• The roles and responsibilities of those responsible for executing the training program.

Each aspect should be accompanied by reasons for your choices based on the organization's context and needs.

Reference no: EM133541815

Questions Cloud

What is the percentage decrease in the stock price : A company's stock decreased from $15 per share to $9 per share. What is the percentage decrease in the stock price? Round your answer to the nearest whole
Section of the statement of cash flows : nonoperating items on the income statement. in the financing activities section of the statement of cash flows
Describe how each item connects to a specific theme within : Choose five facts, events, data, evidence, or statistics from the readings, films, or additional sources that resonate with the central themes of Ethnic Studies
What diagnosis codes and poa indicator should be assigned : chronic CHF and was treated with IV Lasix. What diagnosis codes and POA indicator should be assigned for the CHF
Evaluate whether the management processes utilized : Evaluate whether the management processes utilized by your organization are sufficient to ensure good cybersecurity governance.
What is the most reasonable inference : What is the most reasonable inference you can draw about the lack of an interest line item on the statement of cash flows
What do you think are the most important issues facing : What do you think are the most important issues facing our country today? Explain.What does freedom mean? What are the essential elements of democracy?
Prepare the journal entries to record the purchase : Prepare the journal entries to record the purchase of the bonds by Saxton-Bose on January 1, 2024, interest revenue on June 30, 2024 and interest revenue
Provided a community model that built nationalism among : Rather than follow the age-old European model of autocratic domination, democracy provided a community model that built nationalism among the individualism

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd