SlideShare a Scribd company logo
1 of 5
The Rookie Chief Information Security Officer
This assignment consists of five (5) parts:
Part 1: Organization Chart
Part 2: Request for Proposal (RFP) Plan
Part 3: Physical Security Plan
Part 4: Enterprise Information Security Compliance Program
Part 5: Risk Management Plan
Imagine that you have been recently promoted to serve as Chief
Information Security Officer (CISO) for a Fortune 500
organization. This organization has known brand products
across the world and expects top-secret methods for
safeguarding proprietary information on its recipes and product
lines. The Board of Directors request that their information
security strategy be upgraded to allow greater opportunities of
secure cloud collaboration between suppliers and resellers of
their products. Another concern they have is the recent number
of hacktivist attacks that have caused the network to fail across
the enterprise. Their concern extends to making sure that they
have controlled methods for accessing secured physical areas
within their various regional facilities.
For your new position, you will be responsible for developing
standards, methods, roles, and recommendations that will set the
new IT security path for the organization. The existing
organization has limited experience in supporting an enhanced
level of IT security; therefore, you may need to outsource
certain security services.
Additionally, you may create and / or assume all necessary
assumptions needed for the completion of this assignment.
Write a twelve to fifteen (12-15) page paper in which you
provide the following deliverables:
Part 1: Organization Chart
1. Use Visio or an Open Source alternative, such as Dia, to:
a. Create an organization chart in which you:
i. Illustrate the roles that will be required to ensure
design, evaluation, implementation, and management of security
programs
for the organization.
ii. Within your organizational chart, clearly identify the
reporting structure for roles such as IT Security Compliance
Officer,
Security Manager, CIO, CISO, IT Security Engineer,
Privacy Security Professional, and IT Procurement Specialist.
iii. List the types of resources required to fulfill the each
forensic duty of the organization below each of the roles you
identified.
iv. Align your organization chart to reflect the
Department of Homeland Security (DHS) Essential Body of
Knowledge’s three (3)
areas of information security: physical security
professional, privacy professional, and procurement
professional. Provide
comments and comparisons on how your organizational
chart fosters these three (3) values.
Part 2: Request for Proposal (RFP) Plan
2. Develop a Request for Proposal (RFP) plan to solicit
qualified vendors that could partner with your internal team to
deliver optimum
IT service delivery. The RFP Plan should contain qualifying
criteria of potential vendors and the responsibilities of the
vendor once
the contract is awarded. As part of the plan, you must:
a. Describe at least two (2) perspectives that need to be
closely monitored within the contract.
b. Give your perspective on at least two (2) methods that
could be used to evaluate and develop a qualified trusted
supplier list.
Part 3: Physical Security Plan
3. Recommend a physical security plan that could be used to
protect sensitive areas such as telecom rooms, employee only
areas,
and manufacturing facilities in which you:
a. Include at least three (3) specific methods.
Part 4: Enterprise Information Security Compliance Program
4. Establish an enterprise information security compliance
program that addresses the concerns of the board of directors of
the
organization in which you:
a. Describe specific plans and control objectives that could
be adopted to address the known issues.
b. Suggest at least three (3) information security policies that
could be developed and practiced within the organization for
data
security assurance.
c. Outline the steps you would take to define the security
needs of the organization in terms of duties, staffing, training,
and
processes.
Part 5: Risk Management Plan
5. Develop a risk management plan in which you:
a. Describe at least three (3) possible risk management
efforts that could be used to assess threats and unknown issues.
b. Determine why defining priorities is an important part of
the process when enumerating and having efficient risk control
measures.
c. Suggest specific technical and management controls that
could be enacted in order to monitor risks accurately.
6. Use at least four (4) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
· Include charts or diagrams created in Visio or one of its
equivalents such as Dia. The completed diagrams / charts must
be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
· Describe and apply the 14 areas of common practice in the
Department of Homeland Security (DHS) Essential Body of
Knowledge.
· Describe best practices in cybersecurity.
· Describe physical security plans and processes.
· Evaluate the ethical concerns inherent in cybersecurity and
how these concerns affect organizational policies.
· Explain legal and regulatory compliance practices.
· Explain risk management plans and policies.
· Describe physical security plans and processes.
· Develop a cybersecurity plan that incorporates the Department
of Homeland Security (DHS) Essential Body of Knowledge.
· Identify the strategic management issues in cybersecurity
planning and response.
· Explain data security competencies to include turning policy
into practice.
· Compare and contrast the functional roles of an organization
in the context of cybersecurity.
· Identify and analyze the role of the Chief Information Officer,
Information Security Officer, and IT Security Compliance
Officer in the context of cybersecurity.
· Use technology and information resources to research issues in
cybersecurity.
· Write clearly and concisely about topics associated with
cybersecurity using proper writing mechanics and technical
style conventions.

More Related Content

Similar to The Rookie Chief Information Security OfficerThis assignment c.docx

Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxbriancrawford30935
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comRobinson075
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comsholingarjosh63
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comStephenson06
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comMcdonaldRyan39
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comrobertleses9
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comdonaldzs56
 
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxAssignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxmurgatroydcrista
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comrobertlesew96
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.comjhonklinz11
 
Title Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information SecuritTitle Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information Securitmarilynnhoare
 
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxAssignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxjosephinepaterson7611
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.comKeatonJennings98
 
Scenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govScenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govmayank272369
 

Similar to The Rookie Chief Information Security OfficerThis assignment c.docx (19)

Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docx
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docx
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docxAssignment 1 Developing the Corporate Strategy for Information Secu.docx
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
Title Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information SecuritTitle Developing the Corporate Strategy for Information Securit
Title Developing the Corporate Strategy for Information Securit
 
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxAssignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
Scenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govScenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information gov
 

More from oreo10

All scientific theories must be able to make testable predictions. S.docx
All scientific theories must be able to make testable predictions. S.docxAll scientific theories must be able to make testable predictions. S.docx
All scientific theories must be able to make testable predictions. S.docxoreo10
 
All I wnat is to write a reflection paper on my project which is hac.docx
All I wnat is to write a reflection paper on my project which is hac.docxAll I wnat is to write a reflection paper on my project which is hac.docx
All I wnat is to write a reflection paper on my project which is hac.docxoreo10
 
Alice,Betty, and Carol are playing a game with 48 marbles in a circl.docx
Alice,Betty, and Carol are playing a game with 48 marbles in a circl.docxAlice,Betty, and Carol are playing a game with 48 marbles in a circl.docx
Alice,Betty, and Carol are playing a game with 48 marbles in a circl.docxoreo10
 
All healthcare organizations must convert to an Electronic Health Re.docx
All healthcare organizations must convert to an Electronic Health Re.docxAll healthcare organizations must convert to an Electronic Health Re.docx
All healthcare organizations must convert to an Electronic Health Re.docxoreo10
 
All round writer onlyThis is an individual Mediation assignment..docx
All round writer onlyThis is an individual Mediation assignment..docxAll round writer onlyThis is an individual Mediation assignment..docx
All round writer onlyThis is an individual Mediation assignment..docxoreo10
 
Alice was wondering whether it was a good idea to invest her money i.docx
Alice was wondering whether it was a good idea to invest her money i.docxAlice was wondering whether it was a good idea to invest her money i.docx
Alice was wondering whether it was a good idea to invest her money i.docxoreo10
 
All organisms have DNA, which differs only in the number and order o.docx
All organisms have DNA, which differs only in the number and order o.docxAll organisms have DNA, which differs only in the number and order o.docx
All organisms have DNA, which differs only in the number and order o.docxoreo10
 
All literature involves some kind of performance which is intended f.docx
All literature involves some kind of performance which is intended f.docxAll literature involves some kind of performance which is intended f.docx
All literature involves some kind of performance which is intended f.docxoreo10
 
All key elements of the assignment are covered in a substantiv.docx
All key elements of the assignment are covered in a substantiv.docxAll key elements of the assignment are covered in a substantiv.docx
All key elements of the assignment are covered in a substantiv.docxoreo10
 
Alice, Betty and Carol are playing a game with 48 marbles in a circl.docx
Alice, Betty and Carol are playing a game with 48 marbles in a circl.docxAlice, Betty and Carol are playing a game with 48 marbles in a circl.docx
Alice, Betty and Carol are playing a game with 48 marbles in a circl.docxoreo10
 
Alice Jones was employed as a clerk-typist by a company. She request.docx
Alice Jones was employed as a clerk-typist by a company. She request.docxAlice Jones was employed as a clerk-typist by a company. She request.docx
Alice Jones was employed as a clerk-typist by a company. She request.docxoreo10
 
Air and Water Pollution PaperAir and water pollutants exist in m.docx
Air and Water Pollution PaperAir and water pollutants exist in m.docxAir and Water Pollution PaperAir and water pollutants exist in m.docx
Air and Water Pollution PaperAir and water pollutants exist in m.docxoreo10
 
Air pollution is an environmental health problem in many cities thro.docx
Air pollution is an environmental health problem in many cities thro.docxAir pollution is an environmental health problem in many cities thro.docx
Air pollution is an environmental health problem in many cities thro.docxoreo10
 
After your topic has been approved, the next step is to research.docx
After your topic has been approved, the next step is to research.docxAfter your topic has been approved, the next step is to research.docx
After your topic has been approved, the next step is to research.docxoreo10
 
After watching three of the five movie clips listed in the Multime.docx
After watching three of the five movie clips listed in the Multime.docxAfter watching three of the five movie clips listed in the Multime.docx
After watching three of the five movie clips listed in the Multime.docxoreo10
 
Aging and Disability WorksheetPart IIdentify 2 or .docx
Aging and Disability WorksheetPart IIdentify 2 or .docxAging and Disability WorksheetPart IIdentify 2 or .docx
Aging and Disability WorksheetPart IIdentify 2 or .docxoreo10
 
After watching the video and reading the Web Resource, CDC Autism .docx
After watching the video and reading the Web Resource, CDC Autism .docxAfter watching the video and reading the Web Resource, CDC Autism .docx
After watching the video and reading the Web Resource, CDC Autism .docxoreo10
 
AI Artificial Intelligence1Reading responsePeter .docx
AI Artificial Intelligence1Reading responsePeter .docxAI Artificial Intelligence1Reading responsePeter .docx
AI Artificial Intelligence1Reading responsePeter .docxoreo10
 
Agree or disagree with, and discuss the following statement Corp.docx
Agree or disagree with, and discuss the following statement Corp.docxAgree or disagree with, and discuss the following statement Corp.docx
Agree or disagree with, and discuss the following statement Corp.docxoreo10
 
After watching Reactions to an Impending Death Sentence and Ti.docx
After watching Reactions to an Impending Death Sentence and Ti.docxAfter watching Reactions to an Impending Death Sentence and Ti.docx
After watching Reactions to an Impending Death Sentence and Ti.docxoreo10
 

More from oreo10 (20)

All scientific theories must be able to make testable predictions. S.docx
All scientific theories must be able to make testable predictions. S.docxAll scientific theories must be able to make testable predictions. S.docx
All scientific theories must be able to make testable predictions. S.docx
 
All I wnat is to write a reflection paper on my project which is hac.docx
All I wnat is to write a reflection paper on my project which is hac.docxAll I wnat is to write a reflection paper on my project which is hac.docx
All I wnat is to write a reflection paper on my project which is hac.docx
 
Alice,Betty, and Carol are playing a game with 48 marbles in a circl.docx
Alice,Betty, and Carol are playing a game with 48 marbles in a circl.docxAlice,Betty, and Carol are playing a game with 48 marbles in a circl.docx
Alice,Betty, and Carol are playing a game with 48 marbles in a circl.docx
 
All healthcare organizations must convert to an Electronic Health Re.docx
All healthcare organizations must convert to an Electronic Health Re.docxAll healthcare organizations must convert to an Electronic Health Re.docx
All healthcare organizations must convert to an Electronic Health Re.docx
 
All round writer onlyThis is an individual Mediation assignment..docx
All round writer onlyThis is an individual Mediation assignment..docxAll round writer onlyThis is an individual Mediation assignment..docx
All round writer onlyThis is an individual Mediation assignment..docx
 
Alice was wondering whether it was a good idea to invest her money i.docx
Alice was wondering whether it was a good idea to invest her money i.docxAlice was wondering whether it was a good idea to invest her money i.docx
Alice was wondering whether it was a good idea to invest her money i.docx
 
All organisms have DNA, which differs only in the number and order o.docx
All organisms have DNA, which differs only in the number and order o.docxAll organisms have DNA, which differs only in the number and order o.docx
All organisms have DNA, which differs only in the number and order o.docx
 
All literature involves some kind of performance which is intended f.docx
All literature involves some kind of performance which is intended f.docxAll literature involves some kind of performance which is intended f.docx
All literature involves some kind of performance which is intended f.docx
 
All key elements of the assignment are covered in a substantiv.docx
All key elements of the assignment are covered in a substantiv.docxAll key elements of the assignment are covered in a substantiv.docx
All key elements of the assignment are covered in a substantiv.docx
 
Alice, Betty and Carol are playing a game with 48 marbles in a circl.docx
Alice, Betty and Carol are playing a game with 48 marbles in a circl.docxAlice, Betty and Carol are playing a game with 48 marbles in a circl.docx
Alice, Betty and Carol are playing a game with 48 marbles in a circl.docx
 
Alice Jones was employed as a clerk-typist by a company. She request.docx
Alice Jones was employed as a clerk-typist by a company. She request.docxAlice Jones was employed as a clerk-typist by a company. She request.docx
Alice Jones was employed as a clerk-typist by a company. She request.docx
 
Air and Water Pollution PaperAir and water pollutants exist in m.docx
Air and Water Pollution PaperAir and water pollutants exist in m.docxAir and Water Pollution PaperAir and water pollutants exist in m.docx
Air and Water Pollution PaperAir and water pollutants exist in m.docx
 
Air pollution is an environmental health problem in many cities thro.docx
Air pollution is an environmental health problem in many cities thro.docxAir pollution is an environmental health problem in many cities thro.docx
Air pollution is an environmental health problem in many cities thro.docx
 
After your topic has been approved, the next step is to research.docx
After your topic has been approved, the next step is to research.docxAfter your topic has been approved, the next step is to research.docx
After your topic has been approved, the next step is to research.docx
 
After watching three of the five movie clips listed in the Multime.docx
After watching three of the five movie clips listed in the Multime.docxAfter watching three of the five movie clips listed in the Multime.docx
After watching three of the five movie clips listed in the Multime.docx
 
Aging and Disability WorksheetPart IIdentify 2 or .docx
Aging and Disability WorksheetPart IIdentify 2 or .docxAging and Disability WorksheetPart IIdentify 2 or .docx
Aging and Disability WorksheetPart IIdentify 2 or .docx
 
After watching the video and reading the Web Resource, CDC Autism .docx
After watching the video and reading the Web Resource, CDC Autism .docxAfter watching the video and reading the Web Resource, CDC Autism .docx
After watching the video and reading the Web Resource, CDC Autism .docx
 
AI Artificial Intelligence1Reading responsePeter .docx
AI Artificial Intelligence1Reading responsePeter .docxAI Artificial Intelligence1Reading responsePeter .docx
AI Artificial Intelligence1Reading responsePeter .docx
 
Agree or disagree with, and discuss the following statement Corp.docx
Agree or disagree with, and discuss the following statement Corp.docxAgree or disagree with, and discuss the following statement Corp.docx
Agree or disagree with, and discuss the following statement Corp.docx
 
After watching Reactions to an Impending Death Sentence and Ti.docx
After watching Reactions to an Impending Death Sentence and Ti.docxAfter watching Reactions to an Impending Death Sentence and Ti.docx
After watching Reactions to an Impending Death Sentence and Ti.docx
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

The Rookie Chief Information Security OfficerThis assignment c.docx

  • 1. The Rookie Chief Information Security Officer This assignment consists of five (5) parts: Part 1: Organization Chart Part 2: Request for Proposal (RFP) Plan Part 3: Physical Security Plan Part 4: Enterprise Information Security Compliance Program Part 5: Risk Management Plan Imagine that you have been recently promoted to serve as Chief Information Security Officer (CISO) for a Fortune 500 organization. This organization has known brand products across the world and expects top-secret methods for safeguarding proprietary information on its recipes and product lines. The Board of Directors request that their information security strategy be upgraded to allow greater opportunities of secure cloud collaboration between suppliers and resellers of their products. Another concern they have is the recent number of hacktivist attacks that have caused the network to fail across the enterprise. Their concern extends to making sure that they have controlled methods for accessing secured physical areas within their various regional facilities. For your new position, you will be responsible for developing standards, methods, roles, and recommendations that will set the new IT security path for the organization. The existing organization has limited experience in supporting an enhanced level of IT security; therefore, you may need to outsource certain security services. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. Write a twelve to fifteen (12-15) page paper in which you
  • 2. provide the following deliverables: Part 1: Organization Chart 1. Use Visio or an Open Source alternative, such as Dia, to: a. Create an organization chart in which you: i. Illustrate the roles that will be required to ensure design, evaluation, implementation, and management of security programs for the organization. ii. Within your organizational chart, clearly identify the reporting structure for roles such as IT Security Compliance Officer, Security Manager, CIO, CISO, IT Security Engineer, Privacy Security Professional, and IT Procurement Specialist. iii. List the types of resources required to fulfill the each forensic duty of the organization below each of the roles you identified. iv. Align your organization chart to reflect the Department of Homeland Security (DHS) Essential Body of Knowledge’s three (3) areas of information security: physical security professional, privacy professional, and procurement professional. Provide comments and comparisons on how your organizational chart fosters these three (3) values. Part 2: Request for Proposal (RFP) Plan 2. Develop a Request for Proposal (RFP) plan to solicit qualified vendors that could partner with your internal team to deliver optimum IT service delivery. The RFP Plan should contain qualifying criteria of potential vendors and the responsibilities of the vendor once the contract is awarded. As part of the plan, you must:
  • 3. a. Describe at least two (2) perspectives that need to be closely monitored within the contract. b. Give your perspective on at least two (2) methods that could be used to evaluate and develop a qualified trusted supplier list. Part 3: Physical Security Plan 3. Recommend a physical security plan that could be used to protect sensitive areas such as telecom rooms, employee only areas, and manufacturing facilities in which you: a. Include at least three (3) specific methods. Part 4: Enterprise Information Security Compliance Program 4. Establish an enterprise information security compliance program that addresses the concerns of the board of directors of the organization in which you: a. Describe specific plans and control objectives that could be adopted to address the known issues. b. Suggest at least three (3) information security policies that could be developed and practiced within the organization for data security assurance. c. Outline the steps you would take to define the security needs of the organization in terms of duties, staffing, training, and processes. Part 5: Risk Management Plan 5. Develop a risk management plan in which you: a. Describe at least three (3) possible risk management efforts that could be used to assess threats and unknown issues.
  • 4. b. Determine why defining priorities is an important part of the process when enumerating and having efficient risk control measures. c. Suggest specific technical and management controls that could be enacted in order to monitor risks accurately. 6. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. · Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: · Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. · Describe best practices in cybersecurity. · Describe physical security plans and processes. · Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies. · Explain legal and regulatory compliance practices. · Explain risk management plans and policies. · Describe physical security plans and processes.
  • 5. · Develop a cybersecurity plan that incorporates the Department of Homeland Security (DHS) Essential Body of Knowledge. · Identify the strategic management issues in cybersecurity planning and response. · Explain data security competencies to include turning policy into practice. · Compare and contrast the functional roles of an organization in the context of cybersecurity. · Identify and analyze the role of the Chief Information Officer, Information Security Officer, and IT Security Compliance Officer in the context of cybersecurity. · Use technology and information resources to research issues in cybersecurity. · Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.