Explain roles of given involved in ig policy development

Assignment Help Management Information Sys
Reference no: EM132324272

Assignment: For this discussion you are to explain the roles and responsibilities of those involved in IG policy development.

Select one of the individuals from the following list and discuss what role they play in IG policy development:

• IT Security Analyst

• IT Security Engineer

• IT Audit

• IT Risk

• Compliance

• CISO- Chief Information Security Officer

• CIO- Chief Information Officer

• CTO - Chief Technology Officer

• CEO- Chief Executive Officer

• CFO- Chief Financial Officer

• CPO- Chief Privacy Officer

• Legal

• Governmental Affairs

Next, take the role and select a law, standard, or regulation to apply their role. Lastly, find a company that either uses the standard or is subject to the law or regulation.

There are enough standards and roles that no 2 posts should be the same as an effort to cut down on the potential of the class sharing work. No two individuals are to use the same combination in their post.

Reference no: EM132324272

Questions Cloud

Specify what type of cabling would run to each workstation : Specify what type of cabling would run to each workstation. Specify the connections between the network devices and servers (what type of network are you).
What are the countries with highest hiv epidemic : What are the countries with highest HIV epidemic? What is the healthiest country? What types of correlation can you see between less HIV infections.
Discuss other ways you will get stakeholder input : Discuss other ways you will get stakeholder input. Create your Strategic Plan (a sample has been uploaded). Draft a Vision, Mission, and Values area.
Define what you learned from visiting the website : Please describe the purpose of the website. What you learned from visiting the website. Anything else what you want to describe.
Explain roles of given involved in ig policy development : For this discussion you are to explain the roles and responsibilities of those involved in IG policy development. Select one of the individuals from.
Why you are focusing on specific three security principles : Why you are focusing on the specific three security principles? For each security principle, identify its relevance in the energy sector.
Identify the pillars and write a short description for each : From our weekly chapter reading, we learned that Crowdsourcing can be a very valuable tool for promoting and developing three main pillars of an open government
Defining the dynamic nature of leadership : Our observations from the case study reading in the chapter material, Leadership and Management in Complex Systems research by Jager and van der Vegt (2005).
Perform ema and esdma modeling in brief : The author briefly mentions an open source software tool, EMA Workbench, that can perform EMA and ESDMA modeling. Find EMA Workbench online and go to their.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss data classification and visualization assessment

In this project, you are either work on the hypothetical company or an existing company. Discuss Data Classification and Visualization Assessment.

  Human elements in it strategy

For this assignment, you will continue to work on the Human Elements in IT Strategy document by creating a summary of how people, processes, and technologies are related to the overall success of the IT organization

  Explain the purpose of an it security policy

An introduction or overview of IT Security Policiesfor the executive branch of state governments (covering state agencies andoffices in the executive branch including the governor's office). Explain the purpose of an IT security policy and how it ..

  What are three main stages in an evaluation of an it product

What are the three main stages in an evaluation of an IT product against a trusted computing standard, such as the Common Criteria?

  What aspects of information technology interests you

Network administrator - What aspects of Information Technology interests you and what career aspirations you have in the field?

  Describe the three common forms of data-mining analysis

Describe the three common forms of data-mining analysis and List and define the four primary reasons for the growth of decision-making information systems

  What benefits does schaffer hope to achieve

What benefits does Schaffer hope to achieve from outsourcing its IT infrastructure - Describe the steps taken to develop the RFP and the role that an outside

  Conduct a full and formal audit of your career portfolio

Conduct a full and formal audit of your career portfolio. For now, however, you need to get started on that process.

  Create a use-case diagram for the system

How are the different functional models related, and how does this a? ect the verifcation and validation of the models?

  Describe each of the seven social media platforms

Describe each of the seven social media platforms that have been covered in this course. List at least two things you have learned about each platform.

  Describe flextime equipment that is likely to have a wired

Neil (and you) need to plan for the future. How are your answers to parts a-c likely to change in the next 5 years? In the next 10 years?

  What are the different ways to structure a project

What are the different ways to structure a project, and in what circumstances would you use each? Do you have an example of where you have used project management techniques

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd