Rewrite information security policy to current industry

Assignment Help Management Information Sys
Reference no: EM131189200

When you stepped into your role as a new CIO, you became responsible for the well-being of an organization, not just the IT organization. Some aspects of this organization may be strong, while others are weak. It is easy to focus on only the weaknesses when you consider how to improve the organization. These are the areas where the organization most needs change, and where the changes will have the greatest effect.

Do not ignore the organization's strengths when you plan for change. These areas of strength derive from the organization's "culture" and earlier operating history. Consider how each change is likely to be perceived, and what effect it would have on the culture, before you propose it.

To prepare for this Assignment, review the organization's Information Security Policy document you received in Week 1. Identify aspects of the policy that provide insufficient guidance for the organization, using your experience with the security incident as a guide. Research the course learning resources, Walden University Library, and web to identify industry best and typical practices for each of these aspects.

Rewrite the information security policy to reflect current industry practices in a way that is appropriate for the organization. Remove obsolete content, revise outdated material, and add sections to reflect current technology. Strive for clarity and an appropriate level of detail throughout.

Outline a plan to migrate the organization from its current practices to the new ones. Estimate the necessary budget and schedule and make a cost-benefit argument for adopting the new policy.

The final step is to introduce the changes to the organization. Draft two memos-one to the CEO and your C-level peers, the other to the staff-to introduce the new information security policy.

  • New policy: Rewrite the information security policy to reflect current industry practices in a way that is appropriate for the organization. Remove obsolete content, revise outdated material, and add sections to reflect current technology. Strive for clarity and an appropriate level of detail throughout.
  • Migration plan: Outline a plan to migrate the organization from its current practices to the new ones. Estimate the necessary budget and schedule and make a cost-benefit argument for adopting the new policy.
  • Memos: Draft two memos-one to the CEO and your C-level peers, the other to the staff-to introduce the new information security policy.

You must submit the following:

-Security Incident Logbook

-Revised/updated Information Security Policy

-A plan to roll out the policy to the organization that includes end-user training

-Memos to the executives and staff, including:

  • The root cause of the incident
  • How it was resolved
  • The plan that has been put in place to prevent a future compromise
  • A rationale for the new policy and benefits.

Attachment:- Assignment.rar

Reference no: EM131189200

Questions Cloud

Prove by rational demonstration and econometric verification : They are inherently opposed to the legitimacy of compara. five economic systems in the long run, because this suggests that there exists not one, bui many "natural laws." Apply the lessons developed in chapter 1 about "existence" anc culture to aw..
Attitudes on a variety of subjects : An annual survey of first-year college students asks 273,000 students about their attitudes on a variety of subjects. According to a recent survey, 51% of first-year students believe that abortion should be legal. Use a 0.05 significance level to ..
Determine the optimal order quantity : A toy manufacturer uses approximately 32,000 silicon chips annually. - Determine The optimal order quantity. - Determine The number of workdays in an order cycle.
Expect to be the limiting value of c : (a) What is the average yearly rate of change of carbon-14 during the first 5000 years? (Round your answer to six decimal places.) g/yr (b) How many grams of carbon-14 would you expect to find remaining after 2005 years? (Round your answer to two de..
Rewrite information security policy to current industry : New policy: Rewrite the information security policy to reflect current industry practices in a way that is appropriate for the organization. Remove obsolete content, revise outdated material, and add sections to reflect current technology. Strive for..
How do we define quality within healthcare : Discuss how Quality has evolved over time in various industries to what it is today. Be sure to discuss landmark quality models and the individuals who discovered and pioneered those models.
Construct a cumulative frequency distribution of this data : The number of families who used the Minneapolis YWCA day care service was recorded over a 30-day period.- Construct a cumulative frequency distribution of this data.
What additional information might you seek : You are the controller of ABC manufacturing corp, a publicly traded furniture manufacturing company, based on Long Island. Business has been going well for ABC. Over the last four quarters the EPS have been 50, 54,59, and 60 cents per share. What cou..
Evalute microsofts strategy in good and poor economic times : Evalute Microsoft's strategy in good and poor economic times. ---  Discuss the pros and cons of Microsoft's most.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Business processes and information systems

Provide a brief explanation of the relationship between business processes and information systems and Define a business process and give an example

  How has technology changed the role of retail managers

Write a 750- to 1,000-word paper in which you explore how technology has improved the effectiveness and efficiency of retail management. How has technology changed the role of retail managers

  Design of a database system - management or the workers

Which entity should have the most influence on the design of a database system: management or the workers?

  Goal of improving employee health and lowering health

Draft potential clauses you could include in the contract to provide incentives to the seller based on MYH achieving its main goal of improving employee health and lowering health care premiums as a result of this project. Be creative in your resp..

  Development specialist to develop these functionalities

The mobile application side of this solution will require secure and encrypted connections. Please work with your Security and Network Specialists to develop an appropriate solution for wireless communication in the mobile application. Include the..

  Conduct a work process improvement analysis

Conduct a work process improvement analysis and make recommendations for improvement in various areas of the supply chain. Use effective communication techniques.

  Two benefits of using enterprise systems

Assess at least two benefits of using enterprise systems. What types of relationships are possible in a relational database? Describe and give an example of each

  Paper- continuance intention in the personal use of sns

CSG1132 Communicating in an IT Environment. Research Paper: Continuance Intention in the personal use of Social Networking Services (SNS), developed around a CI theme with SNS selected from: SNS use (logins, hours) and Demographics such as gender and..

  Intrinsic and extrinsic rewardgive an example of intrinsic

intrinsic and extrinsic rewardgive an example of intrinsic reward and an example of extrinsic reward you have met with

  Examine the classifications of security controls

Examine the classifications of security controls (physical, administrative, and technical) and the types of security controls (preventive, detective, and corrective). Explain how these different types of controls are used to enforce security polic..

  Service request for riordan manufacturing

Service Request for Riordan Manufacturing - Explain the benefits of using defined and repeatable processes for accomplishing these activities for the implementation stage.

  Describe online analytical processing

Describe at least two methods that business owners could use in order to protect the privacy of both personal information and organizational data resources related to the Web and information technologies. Provide one example of the use of each met..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd