Reference no: EM131132243
Project- Individual Effort Project
Background
After several weeks of reading, discussing, and writing about a variety of issues related to cyber security I know that you have a better understanding of some of the things that constitute good security. And considering that so much of communication and interpersonal interaction in the business world is already digital and is becoming increasingly so, I thought that a more personal approach to delivering your research would serve you better overall. For many of you, this will be the first time that you've been asked to create a self-narrating presentation. This may at first seem at best daunting or at worst impossible. However, I contend that not only is it quite possible (I've done presentations this way myself) it will in fact be excellent training for the "real world" workplace in which you already are, or will become a part. For some of you, you may see this as an opportunity to pursue creating online tutorials or even creating a podcast. Ultimately, you will have fun doing this assignment while developing research skills, interpersonal skills - way more than just a research paper could do.
The Scenario
I am the Chief Information Security Officer of the organization for which you are working. You are one of my Cyber Security Managers. I need to know what companies are addressing some of the concerns we have regarding cyber security. I have tasked you with creating a self-narrating presentation that can be given to other members of our global security team for review.
Outcome
I want you to choose a company that focuses on addressing one or more problems related to information security. Be careful to not plagiarize material.
Your presentation should not exceed 10 minutes and must include the following topics (at a minimum) in your slides:
• Company Introduction.
• What information security problem does the company address?
• What information security products does the company have to solve the problem?
• is the information security problem that the company is focusing on important?
• Who is the customer for this information security solution?
• What other problems in information security can this company address?
• What competition does the company have?
• How does the company make money?
• Conclusion.
This is not a paper. It is an electronic presentation. It is also not (entirely) an opinion piece on security. Rather, it is an opportunity for you to demonstrate your mastery of course concepts by discussing them intelligently (cite your sources!), in a multi-media format (visual and audio), as you deliver your presentation.
Tutorials for creating a narrated, self-running PowerPoint file are readily available on the internet.
Your PowerPoint presentation must automatically advance slides and play audio once the PowerPoint presentation is started. The resources I have provided tell you how to do this. Your presentation must be between 8 and 11 minutes (failure to meet this requirement will affect your grade). The file size should be no more than 30MB in size. My example has music and video and the size is 21MB.
The presentation will be evaluated based on the (1) organization of information, (2) quality of the content, (3) ease of comprehension, and (4) professionalism of the presentation. It should form a complete package that is readily understandable by someone other than you.
Should meet all the following requirements
Company Approved by Prof?
Timing (At least 8min no more than 11min)
Audio w/ each slide 10 Visually appealing?
Sources cited?
Is the presentation presented in an organized way?
Overall quality of the presentation?
What were reasons and the initial results of stalins policy
: What were the reasons and the initial results of Stalin's policy as expressed in these speeches?
|
To what extent does game theory helps the societ
: To what extent does game theory helps the society to explain financial markets, Your paper must be targeted topic perfectly and it must include following table of indexes.
|
What is the multiplier
: So far in this chapter, we have assumed that the fiscal policy variables G and T are independent of the level of income. In the real world, however, this is not the case. Taxes typically depend on the level of income and so tend to be higher when ..
|
Resignations of communist regimes in europe
: examine the fall of European communism by looking at the 2009 reflections of Mikhail Gorbachev on the resignations of Communist regimes in Europe in 1989-90
|
What information security problem does the company address
: What information security problem does the company address? What information security products does the company have to solve the problem? is the information security problem that the company is focusing on important?
|
Examine the fall of european communism
: What do these readings and the largely non-violent surrender of power by European Communists in most countries where they ruled indicate about the evolution of those societies by that time?
|
Provide the comparison and support your argument
: In this week's readings you learned about the contributions of Newton, Galileo and Copernicus. For your discussion you must choose one of these scientists and argue that his contributions were more significant or had more impact than the other two
|
What is the probability of a natural
: What is the population of interest for this study? Name the most likely type of error that could impact the findings in this study. Explain your choice. What was the sample size for individuals from the US for the current year?
|
3 qualities you want people to associate with your company
: List at least 3 qualities that you want people to associate with your company and brand. TIP: These can be the same characteristics you listed in Assignment 7, or they can be different.
|