SlideShare a Scribd company logo
1 of 5
Term Paper: The Rookie Chief Information Security Officer
This assignment consists of five (5) parts:
Part 1: Organization Chart
Part 2: Request for Proposal (RFP) Plan
Part 3: Physical Security Plan
Part 4: Enterprise Information Security Compliance Program
Part 5: Risk Management Plan
Imagine that you have been recently promoted to serve as Chief
Information Security Officer (CISO) for a Fortune 500
organization. This organization has known brand products
across the world and expects top-secret methods for
safeguarding proprietary information on its recipes and product
lines. The Board of Directors request that their information
security strategy be upgraded to allow greater opportunities of
secure cloud collaboration between suppliers and resellers of
their products. Another concern they have is the recent number
of hacktivist attacks that have caused the network to fail across
the enterprise. Their concern extends to making sure that they
have controlled methods for accessing secured physical areas
within their various regional facilities.
For your new position, you will be responsible for developing
standards, methods, roles, and recommendations that will set the
new IT security path for the organization. The existing
organization has limited experience in supporting an enhanced
level of IT security; therefore, you may need to outsource
certain security services.
Additionally, you may create and / or assume all necessary
assumptions needed for the completion of this assignment.
Write an eight to twelve (8-12) page paper in which you provide
the following deliverables:
Part 1: Organization Chart
1. Use Visio or an Open Source alternative, such as Dia, to:
a. Create an organization chart in which you:
i. Illustrate the roles that will be required to ensure
design, evaluation, implementation, and management of security
programs
for the organization.
ii. Within your organizational chart, clearly identify the
reporting structure for roles such as IT Security Compliance
Officer,
Security Manager, CIO, CISO, IT Security Engineer,
Privacy Security Professional, and IT Procurement Specialist.
iii. List the types of resources required to fulfill the each
forensic duty of the organization below each of the roles you
identified.
iv. Align your organization chart to reflect the
Department of Homeland Security (DHS) Essential Body of
Knowledge’s three (3)
areas of information security: physical security
professional, privacy professional, and procurement
professional. Provide
comments and comparisons on how your organizational
chart fosters these three (3) values.
Part 2: Request for Proposal (RFP) Plan
2. Develop a Request for Proposal (RFP) plan to solicit
qualified vendors that could partner with your internal team to
deliver optimum
IT service delivery. The RFP Plan should contain qualifying
criteria of potential vendors and the responsibilities of the
vendor once
the contract is awarded. As part of the plan, you must:
a. Describe at least two (2) perspectives that need to be
closely monitored within the contract.
b. Give your perspective on at least two (2) methods that
could be used to evaluate and develop a qualified trusted
supplier list.
Part 3: Physical Security Plan
3. Recommend a physical security plan that could be used to
protect sensitive areas such as telecom rooms, employee only
areas,
and manufacturing facilities in which you:
a. Include at least three (3) specific methods.
Part 4: Enterprise Information Security Compliance Program
4. Establish an enterprise information security compliance
program that addresses the concerns of the board of directors of
the
organization in which you:
a. Describe specific plans and control objectives that could
be adopted to address the known issues.
b. Suggest at least three (3) information security policies that
could be developed and practiced within the organization for
data
security assurance.
c. Outline the steps you would take to define the security
needs of the organization in terms of duties, staffing, training,
and
processes.
Part 5: Risk Management Plan
5. Develop a risk management plan in which you:
a. Describe at least three (3) possible risk management
efforts that could be used to assess threats and unknown issues.
b. Determine why defining priorities is an important part of
the process when enumerating and having efficient risk control
measures.
c. Suggest specific technical and management controls that
could be enacted in order to monitor risks accurately.
6. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or one of its
equivalents such as Dia. The completed diagrams / charts must
be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
Describe and apply the 14 areas of common practice in the
Department of Homeland Security (DHS) Essential Body of
Knowledge.
Describe best practices in cybersecurity.
Describe physical security plans and processes.
Evaluate the ethical concerns inherent in cybersecurity and how
these concerns affect organizational policies.
Explain legal and regulatory compliance practices.
Explain risk management plans and policies.
Describe physical security plans and processes.
Develop a cybersecurity plan that incorporates the Department
of Homeland Security (DHS) Essential Body of Knowledge.
Identify the strategic management issues in cybersecurity
planning and response.
Explain data security competencies to include turning policy
into practice.
Compare and contrast the functional roles of an organization in
the context of cybersecurity.
Identify and analyze the role of the Chief Information Officer,
Information Security Officer, and IT Security Compliance
Officer in the context of cybersecurity.
Use technology and information resources to research issues in
cybersecurity.
Write clearly and concisely about topics associated with
cybersecurity using proper writing mechanics and technical
style conventions.

More Related Content

Similar to Term Paper The Rookie Chief Information Security OfficerThis assi.docx

Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comMcdonaldRyan39
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comrobertleses9
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comdonaldzs56
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comrobertlesew96
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comRobinson075
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comsholingarjosh63
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comStephenson06
 
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxAssignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxmurgatroydcrista
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.comjhonklinz11
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxmydrynan
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxbriancrawford30935
 
Title Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information SecuritTitle Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information Securitmarilynnhoare
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.comKeatonJennings98
 
Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxannrodgerson
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWshyamuop
 

Similar to Term Paper The Rookie Chief Information Security OfficerThis assi.docx (19)

Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxAssignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docx
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docx
 
Title Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information SecuritTitle Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information Securit
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 

More from jacqueliner9

TELESPAZIO PERFORMANCE APPRAISAL .docx
TELESPAZIO PERFORMANCE APPRAISAL                                  .docxTELESPAZIO PERFORMANCE APPRAISAL                                  .docx
TELESPAZIO PERFORMANCE APPRAISAL .docxjacqueliner9
 
Tell me everything you know about the following1.  Law Enfo.docx
Tell me everything you know about the following1.  Law Enfo.docxTell me everything you know about the following1.  Law Enfo.docx
Tell me everything you know about the following1.  Law Enfo.docxjacqueliner9
 
Tell me about yourself and highlight your strengths and professional.docx
Tell me about yourself and highlight your strengths and professional.docxTell me about yourself and highlight your strengths and professional.docx
Tell me about yourself and highlight your strengths and professional.docxjacqueliner9
 
Telework opportunities are increasing in health care as they are in .docx
Telework opportunities are increasing in health care as they are in .docxTelework opportunities are increasing in health care as they are in .docx
Telework opportunities are increasing in health care as they are in .docxjacqueliner9
 
Telework opportunities are increasing in health care as they are.docx
Telework opportunities are increasing in health care as they are.docxTelework opportunities are increasing in health care as they are.docx
Telework opportunities are increasing in health care as they are.docxjacqueliner9
 
Telehealth Technology  A summary of the technology to be imple.docx
Telehealth Technology  A summary of the technology to be imple.docxTelehealth Technology  A summary of the technology to be imple.docx
Telehealth Technology  A summary of the technology to be imple.docxjacqueliner9
 
Television continues to remain a viable source of entertainment,  bo.docx
Television continues to remain a viable source of entertainment,  bo.docxTelevision continues to remain a viable source of entertainment,  bo.docx
Television continues to remain a viable source of entertainment,  bo.docxjacqueliner9
 
Telehealth refers to the provision of medical care to affected i.docx
Telehealth refers to the provision of medical care to affected i.docxTelehealth refers to the provision of medical care to affected i.docx
Telehealth refers to the provision of medical care to affected i.docxjacqueliner9
 
Telenursing and TelemedicineTelenursing and telemedicine wil.docx
Telenursing and TelemedicineTelenursing and telemedicine wil.docxTelenursing and TelemedicineTelenursing and telemedicine wil.docx
Telenursing and TelemedicineTelenursing and telemedicine wil.docxjacqueliner9
 
Telehealth technology has extended the arms of traditional health ca.docx
Telehealth technology has extended the arms of traditional health ca.docxTelehealth technology has extended the arms of traditional health ca.docx
Telehealth technology has extended the arms of traditional health ca.docxjacqueliner9
 
Telehealth is a collection of means or methods for enhancing health .docx
Telehealth is a collection of means or methods for enhancing health .docxTelehealth is a collection of means or methods for enhancing health .docx
Telehealth is a collection of means or methods for enhancing health .docxjacqueliner9
 
Telehealth methods to deliver dietary interventions in adults .docx
Telehealth methods to deliver dietary interventions in adults .docxTelehealth methods to deliver dietary interventions in adults .docx
Telehealth methods to deliver dietary interventions in adults .docxjacqueliner9
 
Technology is integral to successful implementation in many proj.docx
Technology is integral to successful implementation in many proj.docxTechnology is integral to successful implementation in many proj.docx
Technology is integral to successful implementation in many proj.docxjacqueliner9
 
technology is influencing and weakening the will power of going for .docx
technology is influencing and weakening the will power of going for .docxtechnology is influencing and weakening the will power of going for .docx
technology is influencing and weakening the will power of going for .docxjacqueliner9
 
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docxTelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docxjacqueliner9
 
Telecommunication NetHere are the instructions Once yo.docx
Telecommunication NetHere are the instructions Once yo.docxTelecommunication NetHere are the instructions Once yo.docx
Telecommunication NetHere are the instructions Once yo.docxjacqueliner9
 
TED Talk Wade Davis In order to begin to develop a global persp.docx
TED Talk Wade Davis In order to begin to develop a global persp.docxTED Talk Wade Davis In order to begin to develop a global persp.docx
TED Talk Wade Davis In order to begin to develop a global persp.docxjacqueliner9
 
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docxTeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docxjacqueliner9
 
Teheran 2Please revise your Reflection Paper #1 according to m.docx
Teheran 2Please revise your Reflection Paper #1 according to m.docxTeheran 2Please revise your Reflection Paper #1 according to m.docx
Teheran 2Please revise your Reflection Paper #1 according to m.docxjacqueliner9
 
TED TalkKen Robinson (10 points)View the following TED Talk by .docx
TED TalkKen Robinson (10 points)View the following TED Talk by .docxTED TalkKen Robinson (10 points)View the following TED Talk by .docx
TED TalkKen Robinson (10 points)View the following TED Talk by .docxjacqueliner9
 

More from jacqueliner9 (20)

TELESPAZIO PERFORMANCE APPRAISAL .docx
TELESPAZIO PERFORMANCE APPRAISAL                                  .docxTELESPAZIO PERFORMANCE APPRAISAL                                  .docx
TELESPAZIO PERFORMANCE APPRAISAL .docx
 
Tell me everything you know about the following1.  Law Enfo.docx
Tell me everything you know about the following1.  Law Enfo.docxTell me everything you know about the following1.  Law Enfo.docx
Tell me everything you know about the following1.  Law Enfo.docx
 
Tell me about yourself and highlight your strengths and professional.docx
Tell me about yourself and highlight your strengths and professional.docxTell me about yourself and highlight your strengths and professional.docx
Tell me about yourself and highlight your strengths and professional.docx
 
Telework opportunities are increasing in health care as they are in .docx
Telework opportunities are increasing in health care as they are in .docxTelework opportunities are increasing in health care as they are in .docx
Telework opportunities are increasing in health care as they are in .docx
 
Telework opportunities are increasing in health care as they are.docx
Telework opportunities are increasing in health care as they are.docxTelework opportunities are increasing in health care as they are.docx
Telework opportunities are increasing in health care as they are.docx
 
Telehealth Technology  A summary of the technology to be imple.docx
Telehealth Technology  A summary of the technology to be imple.docxTelehealth Technology  A summary of the technology to be imple.docx
Telehealth Technology  A summary of the technology to be imple.docx
 
Television continues to remain a viable source of entertainment,  bo.docx
Television continues to remain a viable source of entertainment,  bo.docxTelevision continues to remain a viable source of entertainment,  bo.docx
Television continues to remain a viable source of entertainment,  bo.docx
 
Telehealth refers to the provision of medical care to affected i.docx
Telehealth refers to the provision of medical care to affected i.docxTelehealth refers to the provision of medical care to affected i.docx
Telehealth refers to the provision of medical care to affected i.docx
 
Telenursing and TelemedicineTelenursing and telemedicine wil.docx
Telenursing and TelemedicineTelenursing and telemedicine wil.docxTelenursing and TelemedicineTelenursing and telemedicine wil.docx
Telenursing and TelemedicineTelenursing and telemedicine wil.docx
 
Telehealth technology has extended the arms of traditional health ca.docx
Telehealth technology has extended the arms of traditional health ca.docxTelehealth technology has extended the arms of traditional health ca.docx
Telehealth technology has extended the arms of traditional health ca.docx
 
Telehealth is a collection of means or methods for enhancing health .docx
Telehealth is a collection of means or methods for enhancing health .docxTelehealth is a collection of means or methods for enhancing health .docx
Telehealth is a collection of means or methods for enhancing health .docx
 
Telehealth methods to deliver dietary interventions in adults .docx
Telehealth methods to deliver dietary interventions in adults .docxTelehealth methods to deliver dietary interventions in adults .docx
Telehealth methods to deliver dietary interventions in adults .docx
 
Technology is integral to successful implementation in many proj.docx
Technology is integral to successful implementation in many proj.docxTechnology is integral to successful implementation in many proj.docx
Technology is integral to successful implementation in many proj.docx
 
technology is influencing and weakening the will power of going for .docx
technology is influencing and weakening the will power of going for .docxtechnology is influencing and weakening the will power of going for .docx
technology is influencing and weakening the will power of going for .docx
 
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docxTelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
TelecommutingA. Telecommuting (Level 2)a. Introduction for T.docx
 
Telecommunication NetHere are the instructions Once yo.docx
Telecommunication NetHere are the instructions Once yo.docxTelecommunication NetHere are the instructions Once yo.docx
Telecommunication NetHere are the instructions Once yo.docx
 
TED Talk Wade Davis In order to begin to develop a global persp.docx
TED Talk Wade Davis In order to begin to develop a global persp.docxTED Talk Wade Davis In order to begin to develop a global persp.docx
TED Talk Wade Davis In order to begin to develop a global persp.docx
 
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docxTeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
TeenAddiction· In Section I (approximately 6-8 pages, doubl.docx
 
Teheran 2Please revise your Reflection Paper #1 according to m.docx
Teheran 2Please revise your Reflection Paper #1 according to m.docxTeheran 2Please revise your Reflection Paper #1 according to m.docx
Teheran 2Please revise your Reflection Paper #1 according to m.docx
 
TED TalkKen Robinson (10 points)View the following TED Talk by .docx
TED TalkKen Robinson (10 points)View the following TED Talk by .docxTED TalkKen Robinson (10 points)View the following TED Talk by .docx
TED TalkKen Robinson (10 points)View the following TED Talk by .docx
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Term Paper The Rookie Chief Information Security OfficerThis assi.docx

  • 1. Term Paper: The Rookie Chief Information Security Officer This assignment consists of five (5) parts: Part 1: Organization Chart Part 2: Request for Proposal (RFP) Plan Part 3: Physical Security Plan Part 4: Enterprise Information Security Compliance Program Part 5: Risk Management Plan Imagine that you have been recently promoted to serve as Chief Information Security Officer (CISO) for a Fortune 500 organization. This organization has known brand products across the world and expects top-secret methods for safeguarding proprietary information on its recipes and product lines. The Board of Directors request that their information security strategy be upgraded to allow greater opportunities of secure cloud collaboration between suppliers and resellers of their products. Another concern they have is the recent number of hacktivist attacks that have caused the network to fail across the enterprise. Their concern extends to making sure that they have controlled methods for accessing secured physical areas within their various regional facilities. For your new position, you will be responsible for developing standards, methods, roles, and recommendations that will set the new IT security path for the organization. The existing organization has limited experience in supporting an enhanced level of IT security; therefore, you may need to outsource certain security services. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. Write an eight to twelve (8-12) page paper in which you provide the following deliverables: Part 1: Organization Chart 1. Use Visio or an Open Source alternative, such as Dia, to: a. Create an organization chart in which you: i. Illustrate the roles that will be required to ensure design, evaluation, implementation, and management of security
  • 2. programs for the organization. ii. Within your organizational chart, clearly identify the reporting structure for roles such as IT Security Compliance Officer, Security Manager, CIO, CISO, IT Security Engineer, Privacy Security Professional, and IT Procurement Specialist. iii. List the types of resources required to fulfill the each forensic duty of the organization below each of the roles you identified. iv. Align your organization chart to reflect the Department of Homeland Security (DHS) Essential Body of Knowledge’s three (3) areas of information security: physical security professional, privacy professional, and procurement professional. Provide comments and comparisons on how your organizational chart fosters these three (3) values. Part 2: Request for Proposal (RFP) Plan 2. Develop a Request for Proposal (RFP) plan to solicit qualified vendors that could partner with your internal team to deliver optimum IT service delivery. The RFP Plan should contain qualifying criteria of potential vendors and the responsibilities of the vendor once the contract is awarded. As part of the plan, you must: a. Describe at least two (2) perspectives that need to be closely monitored within the contract. b. Give your perspective on at least two (2) methods that could be used to evaluate and develop a qualified trusted supplier list.
  • 3. Part 3: Physical Security Plan 3. Recommend a physical security plan that could be used to protect sensitive areas such as telecom rooms, employee only areas, and manufacturing facilities in which you: a. Include at least three (3) specific methods. Part 4: Enterprise Information Security Compliance Program 4. Establish an enterprise information security compliance program that addresses the concerns of the board of directors of the organization in which you: a. Describe specific plans and control objectives that could be adopted to address the known issues. b. Suggest at least three (3) information security policies that could be developed and practiced within the organization for data security assurance. c. Outline the steps you would take to define the security needs of the organization in terms of duties, staffing, training, and processes. Part 5: Risk Management Plan 5. Develop a risk management plan in which you: a. Describe at least three (3) possible risk management efforts that could be used to assess threats and unknown issues. b. Determine why defining priorities is an important part of the process when enumerating and having efficient risk control measures. c. Suggest specific technical and management controls that could be enacted in order to monitor risks accurately. 6. Use at least three (3) quality resources in this assignment.
  • 4. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. Describe best practices in cybersecurity. Describe physical security plans and processes. Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies. Explain legal and regulatory compliance practices. Explain risk management plans and policies. Describe physical security plans and processes. Develop a cybersecurity plan that incorporates the Department of Homeland Security (DHS) Essential Body of Knowledge. Identify the strategic management issues in cybersecurity planning and response. Explain data security competencies to include turning policy into practice. Compare and contrast the functional roles of an organization in the context of cybersecurity.
  • 5. Identify and analyze the role of the Chief Information Officer, Information Security Officer, and IT Security Compliance Officer in the context of cybersecurity. Use technology and information resources to research issues in cybersecurity. Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.