How to ensure information systems security issues

Assignment Help Software Engineering
Reference no: EM13779959

Research the role of the Chief Information Security Officer (CISO) to find answers to the following questions:

1. What is the role of the CISO in an organization?

2. What types of knowledge, skills, and abilities are most important for a successful CISO to have?

3. How can a CISO contribute to making security a priority during the system development life cycle (SDLC)? (Provide specific examples for two or more phases of the SDLC.)

Write a plain English summary of your research making sure that you provide a detailed answer for each question along with appropriate examples.

Your response must be 150+ words in length and contain APA format in-text citations and references.

Suggested Resource:

Brenner, B. (2010, November 2). The New CISO: How the role has changed in 5 years. CISO. Retrieved from https://www.csoonline.com/article/print/632223

2. Business Continuity Planning (BCP) is a critical business process which requires the participation of managers from all parts of the enterprise. The CISO and CISO staff members should be key players on the BCP team. In this learning activity you will learn more about the BCP process and then answer questions about CISO participation on this team.

Watch three Federal Emergency Management Agency (FEMA) videos on the importance of Business Continuity Planning (BCP). Follow these instructions to access the videos:

1. Open the READY.GOV Web site: https://www.ready.gov/business-continuity-planning-suite
2. Scroll down to the tabs and read the content under the tab labeled "Learn about the tools"
3. Click on the tab labeled "Business Continuity Video Training."
4. Click on and watch the first three videos on the Web page:
(a) Business Continuity Training - Introduction,
(b) Business Continuity Training - Part One What is Business Continuity Planning?
(c) Business Continuity Training - Part Two Why is Business Continuity Planning Important?

If you cannot view the videos, read the transcripts which are posted below this discussion question.

After you have watched the videos (or read the transcripts), reflect upon the relationship between business continuity planning and the overarching security requirements to protect the confidentiality, integrity, and availability of information and information systems EVEN DURING A DISASTER. Write a plain English explanation of this relationship. In your explanation, address the following:

Identify and discuss three reasons (from the videos) as to why business continuity planning is important to an organization's overall information systems security program.

Identify and discuss the harm that could occur if a business is not prepared to respond to a disaster which prevents restoration of business operations at the original site within 72 hours (3 days) -- the standard time criteria for invocation of a business continuity plan after a disaster has occurred.

How can the CISO and CISO staff members help to ensure that the BCP process appropriately addresses information systems security issues?

Reference no: EM13779959

Questions Cloud

Explain the ethical issues that arise in this situation : Explain the ethical issues that arise in this situation. Explain how you would respond to Joint Commission concerns
State government levy tariffs on imports : Why not have State governments levy tariffs on imports, or tax other states' products. Would this be a sensible way to raise revenues? What are the advantages/disadvantages? Provide research support for your positions. Respond to at least two ..
Problem related to the house for rent : You have been relocated by your employer to a new city for an assignment that will probably last for two years.  You do not want to sell your home - a four-bedroom, two-bath Tudor - so you decide to rent it.
Problem regarding the buying a house : Imagine you are a public administrator who has just been promoted to a higher position but must relocate to another city and purchase a different home. Using the five distributing bargaining skills, present the steps and various aspects you would ..
How to ensure information systems security issues : How can the CISO and CISO staff members help to ensure that the BCP process appropriately addresses information systems security issues
Withholding information case : Read the Withholding Information Case and address the following: Identify ethical systems that may guide the parties to a negotiation.
Elements of negotiation and bargaining skills : Discuss the following statements then respond to at least two of your fellow students' posts.
Negotiation process-distributive bargaining : Define the Four Stages of the Negotiation Process and discuss what changes have taken place in the negotiation tactics since the 1950s.
Determine the weight percent of selenium : Determine the weight percent of selenium in the soil sample and find the absolute uncertainty in the wt% Se. Report the weight percent and absolute uncertainty with three significant figures.

Reviews

Write a Review

Software Engineering Questions & Answers

  Explain why you selected the architecture of this case study

Read the case study titled "A Patient Information System for Mental Health Care", located in Chapter 1 of your textbook (attached). Develop an overall architecture for the system described in the assigned reading. Explain why you selected the arch..

  When implementing a new system there are many different

when implementing a new system there are many different models that a company can choose to follow sdlc rad prototyping

  Moist air enters a device operating at steady state

Moist air enters a device operating at steady state at 1 atm with a dry-bulb temperature of 55C and a wet-bulb temperature of 25C. Liquid water at 20C is sprayed into the air stream, bringing it to 40 C, 1atm at the exit. Determine

  Revamp the newsletter tutorial

Using the finished tutorial as a template, consider how the pages hold style continuity within a particular grid system (as explained in class) and improve upon it. Use the tutorial newsletter as a template but use your own images and headlines to..

  Design and development phases of software development

Discuss efforts that can be done at design and development phases of software development which pay dividends later in software maintenance, that is, improve the ability to maintain.

  Beats number at output of first round of des decryption

Calculate the beats number 1, 16, 33, and 48 at output of first round of DES decryption, suppose that ciphertext block is composed of all ones.

  Dna statistics processor

Design a C++ program to a given detailed specification - Your ability to research technical knowledge required to create the desired program (in this case, optionally, a small amount of genetic knowledge) and reference your sources

  Creating a flowchart and pseudocode

You have a document with the grades of students from Starting Programming, along with the students data. Your part of the program has to loop through records,

  Uml class diagram for client and invoice classes

Design UML class diagram for client and invoice classes, design the code in Java for your client and invoice classes, and draw the program that consultant will use.

  The security problem in software development life cycle

The Security Problem in Software Development Life Cycle, From the e-Activity, contemplate the main reasons why you believe the Francophoned attacks were successful, and explore the key factors that made the social engineering aspect of the attacks ..

  When implementing a new system there are many different

when implementing a new system there are many different models that a company can choose to follow sdlc rad prototyping

  Car park system analysis and design

Car Park System Analysis and Design - Analysis Use Case Model Diagram for whole system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd