SlideShare a Scribd company logo
1 of 3
Title: Developing the Corporate Strategy for Information
Security
Imagine that you are working for a startup technology
organization that has had overnight success. The organization’s
immediate growth requires for it to formulate a corporate
strategy for information security. You have been recruited to
serve as part of a team that will develop this strategy.
As part of the Information Security Strategy development, you
are required to define specific Information Technology Security
roles that will optimize and secure the organization’s data
assets.
Review the “Cybersecurity: The Essential Body of Knowledge
(EBK)” textbook for information necessary to complete this
assignment.
Write a five to seven (5-7) page paper in which you do the
following, based on the scenario described below:
1. The Chief Information Security Officer (CISO) is responsible
for several functions within an organization.
a. Examine three (3) specific functions a CISO and provide
examples of when a CISO would execute these functions within
the organization.
b. Specify at least three (3) competencies that the CISO could
perform using the provided Website titled, Information
Technology
(IT) Security Essential Body of Knowledge (EBK): A
Competency and Functional Frame-work for IT Security
Workforce Development.”
2. The Chief Information Officer (CIO) is responsible for
several accountability functions within an organization:
a. Identify at least four (4) functions of the CIO using the
EBK as a guide. Provide examples of how the CIO would
execute these functions within an organization.
b. Classify at least two (2) security assurances that could be
achieved by the CIO developing a formal security awareness,
training, and educational program.
c. Suggest methods, processes, or technologies that can be
used by the CIO to certify the security functions and data assets
of an organization on a day-to-day basis.
3. Describe how the digital forensics function complements the
overall security efforts of the organization.
4. Evaluate the operational duties of digital forensic personnel
and how these help qualify the integrity of forensic
investigations within the enterprise and industry.
5. List at least three (3) technical resources available to the
digital forensics professional to perform forensic audits and
investigations.
6. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Title Developing the Corporate Strategy for Information Securit

More Related Content

Similar to Title Developing the Corporate Strategy for Information Securit

This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxgasciognecaren
 
The Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxThe Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxKomlin1
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comRobinson069
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comGeorgeDixon99
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comMcdonaldRyan39
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxelinoraudley582231
 
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docxCyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docxtheodorelove43763
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comrobertleses9
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comdonaldzs56
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comrobertlesew96
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comRobinson075
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comsholingarjosh63
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comStephenson06
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.comjhonklinz11
 
CIS 560 Entire Course NEW
CIS 560 Entire Course NEWCIS 560 Entire Course NEW
CIS 560 Entire Course NEWshyamuopuop
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
These are discussion questions (4).  Need short response to each o.docx
These are discussion questions (4).  Need short response to each o.docxThese are discussion questions (4).  Need short response to each o.docx
These are discussion questions (4).  Need short response to each o.docxalisoncarleen
 
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docxCYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docxalanrgibson41217
 

Similar to Title Developing the Corporate Strategy for Information Securit (20)

This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
 
The Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxThe Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docx
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docxCyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
CIS 560 Entire Course NEW
CIS 560 Entire Course NEWCIS 560 Entire Course NEW
CIS 560 Entire Course NEW
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
These are discussion questions (4).  Need short response to each o.docx
These are discussion questions (4).  Need short response to each o.docxThese are discussion questions (4).  Need short response to each o.docx
These are discussion questions (4).  Need short response to each o.docx
 
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docxCYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
 

More from marilynnhoare

1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docx1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docxmarilynnhoare
 
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docxmarilynnhoare
 
1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docx1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docxmarilynnhoare
 
1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docx1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docxmarilynnhoare
 
1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docx1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docxmarilynnhoare
 
1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docxmarilynnhoare
 
.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docx.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docxmarilynnhoare
 
.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docx.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docxmarilynnhoare
 
.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docx.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docxmarilynnhoare
 
.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docx.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docxmarilynnhoare
 
.three pages minimum topic Life Long Learning of Engineering i.docx
.three pages minimum topic  Life Long Learning of Engineering i.docx.three pages minimum topic  Life Long Learning of Engineering i.docx
.three pages minimum topic Life Long Learning of Engineering i.docxmarilynnhoare
 
.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docx.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docxmarilynnhoare
 
.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docx.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docxmarilynnhoare
 
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docxmarilynnhoare
 
.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docx.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docxmarilynnhoare
 
.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docx.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docxmarilynnhoare
 
. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docx. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docxmarilynnhoare
 
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docxmarilynnhoare
 
. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docx. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docxmarilynnhoare
 
-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docx-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docxmarilynnhoare
 

More from marilynnhoare (20)

1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docx1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docx
 
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
 
1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docx1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docx
 
1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docx1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docx
 
1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docx1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docx
 
1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx
 
.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docx.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docx
 
.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docx.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docx
 
.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docx.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docx
 
.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docx.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docx
 
.three pages minimum topic Life Long Learning of Engineering i.docx
.three pages minimum topic  Life Long Learning of Engineering i.docx.three pages minimum topic  Life Long Learning of Engineering i.docx
.three pages minimum topic Life Long Learning of Engineering i.docx
 
.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docx.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docx
 
.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docx.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docx
 
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
 
.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docx.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docx
 
.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docx.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docx
 
. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docx. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docx
 
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
 
. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docx. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docx
 
-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docx-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docx
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 

Recently uploaded (20)

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 

Title Developing the Corporate Strategy for Information Securit

  • 1. Title: Developing the Corporate Strategy for Information Security Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy. As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization’s data assets. Review the “Cybersecurity: The Essential Body of Knowledge (EBK)” textbook for information necessary to complete this assignment. Write a five to seven (5-7) page paper in which you do the following, based on the scenario described below: 1. The Chief Information Security Officer (CISO) is responsible for several functions within an organization. a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization. b. Specify at least three (3) competencies that the CISO could perform using the provided Website titled, Information Technology (IT) Security Essential Body of Knowledge (EBK): A
  • 2. Competency and Functional Frame-work for IT Security Workforce Development.” 2. The Chief Information Officer (CIO) is responsible for several accountability functions within an organization: a. Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization. b. Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. c. Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis. 3. Describe how the digital forensics function complements the overall security efforts of the organization. 4. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry. 5. List at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations. 6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.