Explain the importance of cybersecurity governance

Assignment Help Management Information Sys
Reference no: EM132185337

Question: The importance of cybersecurity governance as a fundamental aspect of protecting an organization's information systems

1. Unit 1 focused on various leadership roles and their respective responsibilities in implementing an effective cybersecurity governance plan. Consider the leadership roles (CEO, CSO/CIO, and Program Managers) in Sony organization and their responsibilities in implementing the organization's cybersecurity strategy:

- Explain the Sony's organization's governing structure, and its approach to cybersecurity. you may extrapolate the formal roles from the data available and contrast this with what was observed.

- Based on your substantiation above, recommend changes that should be implemented and, if applicable, propose a new cybersecurity leadership plan that addresses it Sony's shortcomings.

- (Approx. 300-400 words)

2. Unit 2 of this module described the management processes organizations should consider when developing a cybersecurity governance plan.

? Evaluate why the management processes utilized by Sony were insufficient to ensure good cybersecurity governance; and

? Based on your substantiation above, recommend management processes that would have addressed Sony's shortcomings in implementing a cybersecurity governance plan and should be adhered to going forward.

(Approx. 300-400 words)

3. Unit 3 focuses on the importance of keeping an organization's cybersecurity awareness updated. To do so, think of types of Cybersecurity awareness training that are available and the topics that should ideally be included in training programs. In your answer, address the following:

- If relevant, identify any cybersecurity awareness programs or practices utilized by Sony.

- Based on your substantiation above, provide an outline of a cybersecurity awareness program you would suggest for Sony.

Your outline of the training program should cover the following three aspects:

1. The type of security awareness training (classroom or online);

2. The topics included in the training program;

3. The target audience; and

4. The roles and responsibilities of those responsible for executing the training program.

Each aspect should be accompanied by reasons for your choices based on the organization's context and needs.

(Approx. 300-400 words)

Note: The word counts for each question serve as a guide; your submission should not exceed 1,200 words in its entirety.

Reference no: EM132185337

Questions Cloud

Income tax provision increase : If Morley's pretax income increases by $1million, by how much does its income tax provision increase in the following circumstances:
Describe the steps you would use to test the plan : Describe the steps you would use to test the plan to ensure that the backup plan would function in case of and actual emergency.
How would you implement the different types of glass : You are the Executive Safety Officer (ESO) and was tasked to ensure that the facility is secure. In this assignment discuss "How does the different types.
What is the size of the payment : A debt of $8,000.00 is to be paid off with 6 equal semi-annual payments. If the interest rate is 9% compounded semi-annual, what is the size of the payment?
Explain the importance of cybersecurity governance : The importance of cybersecurity governance as a fundamental aspect of protecting an organization's information systems.
How much must you put into the annuity today to make : If you will defer payments for 34 years and then receive payments at the end of every six months in the amount of $15,000.00 for 15 years.
Prepare an issue log for the project : Prepare an Issue Log for the project. Include issues such as Virginia and Vicky leaving the company, and difficult and vocal members of the user group.
Find the present value of an annuity with annual payments : Find the present value of an annuity with annual payments of $1,300.00 compounded at the end of each year for 6 years after being
What is the wacc if the company wishes : What is the WACC if the company wishes to raise funds in the following proportions: 40 percent debt, 20 percent preferred stock, and 40 percent common equity?

Reviews

Write a Review

Management Information Sys Questions & Answers

  How would the main character go about solving the crime

How would the main character go about solving the crime and identifying the perpetrator using the tools you've learned about?

  Describe risk management and assess its level

Contrast risk, threat, and vulnerability.Describe risk management and assess its level of importance in information security.

  Discuss how papa principles of ethics can be applied

Compare and contrast traditional outsourcing with the Software as a Service (SaaS). Under what conditions should a company choose SaaS over traditional outsourcing? Discuss how PAPA principles of ethics (Motiwalla & Thompson 2012, p.278) can be app..

  Discuss the role of the executive branchs open data

Discuss the role of the executive branch's Open Data / Open Government policies in making data available via Data Gov.

  What is the privacy policy of the organization

How does the organization organize its internal and external communication? What is the age of the organization? What is the organizational structure?

  Addressing the disadvantages of waterfall modelthe

addressing the disadvantages of waterfall modelthe waterfall model has some disadvantages. it only incorporates

  Research and discuss the benefits of using classes

Research and discuss the benefits of using classes. Drawing from your research, sketch out a sample hierarchy of classes that could be used and what functions or properties would they include.

  Queensland health payroll system project plan

ISYS302: Management of IT Systems and Projects. You are a team of consultants working for IBM in early 2007. You have been involved in the Queensland Government's Shared Services Initiative, and you know the team at CorpTech very well. You successf..

  How do you protect yourself from ransomware

The name and URL of the video, 2) What the presentation was about, 3) How could you apply this to business, & 4) What you thought about it and how to apply in your personal life. Two pages and half.

  Evaluate the benefits of cloud computing for modern

Evaluate the benefits of cloud computing for modern and legacy organizations looking to migrate to the cloud. Support the use of cloud computing as a viable option within an organizational business continuity strategy

  Explain the role that information technology plays

Explain the role that information technology plays in each of these businesses and describe the role of the various IT professionals involved in this case.

  Which sites provide the most useful information

Which sites provide the most useful information? Which sites enable you to find useful information easily?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd