SlideShare a Scribd company logo
CSIA 300 - Leadership and Management Study Note 2020.pdf
LEADERSHIP & MANAGEMENT
Study Notes for CSIA 300: Cybersecurity for Leaders and
Managers
© 2020 by University of Maryland Global Campus. All Rights
Reserved.
UNDERSTANDING LEADERSHIP
From: Northouse, P. G. (2008 ). Introduction to leadership:
Concepts and practice (4th ed.). Thousand Oaks, CA: SAGE
Publications.
From:
https://nelsontouchconsulting.wordpress.com/2011/02/22/leader
ship-vs-management/
LEADERSHIP IN CYBERSECURITY
• Define and articulate a vision
• Develop and promote strategy
• Motivate, inspire, and empower
• Create, invent, integrate solutions
• Excellence, Quality, Ethics, Morality
INFLUENCING LEADERS
• Find a wedge and then widen the crack to open doors for
Cybersecurity discussions
with the organization’s leaders
• Learn to speak their language
• Business Leaders think in terms of profits and losses
• Government Leaders think in terms of budgets and compliance
(legal, regulatory)
• Address the twin problems of ignorance and complacency
• Cybersecurity is not a well-known quantity outside of CIO and
CISO organizations
• Seek opportunities to educate peers within the organization
• Participate in Governance activities
• Contribute to Enterprise Risk Management
• Contribute to Business Continuity Planning
• Contribute to Budgets, Strategies, and Futures Thinking
From:
https://nelsontouchconsulting.wordpress.com/2011/02/22/leader
ship-vs-management/
ASSETS TO BE MANAGED
• Information
• Intellectual Property including sensitive business plans,
product designs, finances
• Information held in trust (customer and vendor)
• Information Systems
• Workstations
• Mobile Devices
• Network Security Appliances
• Information Infrastructures
• Networks
• Networking Equipment
CYBERSECURITY MANAGEMENT
• Threats
• Vulnerabilities
• Configurations
• Patches
• Mitigations & Controls
• Compliance & Audits
• People, Processes, Policies, Plans, Technologies (and quite a
bit more!)
PROJECT MANAGEMENT
• Project Management is concerned with:
• Cost
• Schedule
• Quality
• “A project is temporary in that it has a defined beginning and
end in time,
and therefore defined scope and resources.”
• “A project is unique in that it is not a routine operation, but a
specific set of
operations designed to accomplish a singular goal.”
Source: https://www.pmi.org/about/learn-about-pmi/what-is-
project-management
PROJECT MANAGEMENT
• Project management processes fall into five groups:
• Initiating
• Planning
• Executing
• Monitoring and Controlling
• Closing
• Source: https://www.pmi.org/about/learn-about-pmi/what-is-
project-
management
PROJECT MANAGEMENT
• Project management knowledge
draws on ten areas:
1. Integration
2. Scope
3. Time
4. Cost
5. Quality
• Project management knowledge
draws on ten areas:
6. Procurement
7. Human resources
8. Communications
9. Risk management
10. Stakeholder management
Source: https://www.pmi.org/about/learn-about-pmi/what-is-
project-management
LEADERSHIP + MANAGEMENT
argues that leadership and management involve
two distinct
but complementary sets of action.
Mohindra)
• Adapted from
https://nelsontouchconsulting.wordpress.com/2011/02/22/leader
ship-vs-
management/
leadership & managementUnderstanding LeadershipSlide
Number 3Leadership in cybersecurityInfluencing leadersSlide
Number 6Assets to be managedCybersecurity
managementProject ManagementProject managementProject
managementLeadership + management
CSIA 300 Padgett-Beale Corporate Profile 2020.pdf
Copyright © 2020 by University of Maryland Global Campus.
All Rights Reserved.
CYBERSECURITY MANAGEMENT & POLICY
Padgett-Beale, Inc.
A case study for Cybersecurity Management &
Policy Students
Valorie J. King, PhD
1/2/2020
CSIA 300 Cybersecurity for Leaders and Managers
Copyright © 2020 by University of Maryland Global Campus.
All Rights Reserved.
Padgett-Beale Organization Chart -- 2020
Figure 1. Padgett-Beale, Inc. Organization Chart
CSIA 300: Cybersecurity for Leaders and Managers
Copyright © 2020 by University of Maryland University
College. All Rights Reserved.
Company History
Elmer and Robenia Padgett’s first hotel, Robenia’s Guest
House, opened in 1925 with six
family suites (two per floor), a tea room, and a formal dining
room. The guest house
primarily served wealthy families who relocated to the seashore
for the summer to escape
the heat in New York City. This property provided amenities
and services matching those of rival long-
stay hotels in major cities along the East Coast. The second and
third properties, Padgett’s Hotel and
Padgett’s Beach House, were acquired in 1935. Flintom’s
Tavern, a landmark restaurant and
entertainment venue, was added to the Padgett properties
portfolio in 1940.
Periodic resurgences in popularity of the seashore as a vacation
destination occurred over the next fifty
years (1940-1990) as bridges were built, roads were improved,
and regional economies strengthened.
These resurgences brought additional competition as new motels
and resorts operated by national
chains entered the seashore vacations market. Major weather
events in the 1970’s resulted in damage
to both Padgett’s Beach House and Flintom’s Tavern causing
both to close for an extended period of
renovations. The Padgett family’s brand remained strong,
despite these setbacks, as members of the
family took a personal interest in the day-to-day operations and
management of the company.
Padgett’s was not an early adopter of computers and
information technology. But, over time and as
younger family members entered the business, computers began
a slow march into the company’s
offices in the form of personal computers with word processing,
spreadsheets, and database systems.
Personal computers also made their way into manager’s offices
in the hotel properties where
spreadsheets proved valuable in tracking revenues and expenses.
In 1982, an embezzlement scandal at
Flintom’s Tavern forced the company to adopt computer-based
point of sale (POS) systems throughout
the company for all cash handling functions (hotel front desks
and restaurants). A benefit of the POS
systems were the built-in reporting functions, which enabled the
company to more closely track cash
and credit sales by property. By 1995, the company had fully
integrated custom hotel management
software into its operations. This software and the associated
databases were hosted on company
owned / operated mainframe computer systems. By the end of
the decade, information technologies
were in use to support all aspects of the company’s internal
operations (accounting, customer service,
property management, and reservations).
At the beginning of the new century, the company adopted its
first strategic plan with a heavy emphasis
upon growth and expansion. Under this plan, the company
branched out and began offering hotel and
resort management services to other hoteliers and property
owners. Advanced telephony services and
implementation of custom software allowed Padgett’s to offer
one of the first centralized reservations
management services. The company also leveraged the Internet
and World Wide Web to launch a resort
affiliates program, which provided a menu of business related
services to member properties. These
services included: online advertising and promotions,
architecture and design assistance, business
operations consulting, group business insurance, and guest
loyalty programs. The hotel and resort
management services business area continues to be the major
source of revenues and profits for the
company and its owners.
CSIA 300: Cybersecurity for Leaders and Managers
Copyright © 2020 by University of Maryland University
College. All Rights Reserved.
As part of Padgett’s expansion plan, the company purchased
Beale Realty Holdings in 2001 and formed
Padgett-Beale, Inc. (PBI). Shortly thereafter, PBI embarked on
a series of real-estate acquisition
activities, which led to the purchase of several large tracts of
prime Eastern Shore waterfront property.
The company’s long-term plan was to hold the properties as real
estate investments and, when market
demand rose sufficiently, expand into development, sales, and
management of condominiums and
vacation time-share properties. The focus on long term
investment was a wise choice as this particular
market segment was adversely impacted by the housing
boom/bust in the mid 2000’s.
At the time of purchase, the waterfront properties were in use as
campgrounds and resorts for tent-
campers, travel-trailers, and motorhomes. These camping
facilities were allowed to continue their
existing operations with minimal investment and oversight for
the next 15 years (2002 – 2017). During
this laissez-faire management period, some campground
managers modernized their camp offices and
stores by purchasing computer-based point of sale systems that
allowed them to accept credit and debit
cards. Most of these managers also outsourced their reservations
management to a third party online
reservations system, which provided a customized website to
advertise each park and provide access to
the online reservations system. A few campgrounds did not
modernize beyond setting up a simple
website with contact information and a few photographs. These
facilities continue to use a mail or
telephone-based reservation process with a “cash only” payment
policy.
In 2015, the day-to-day operations and management of PBI was
transitioned to a new leadership team
recruited from leading hotel and resort management companies.
The new leadership team includes the
Chief Executive Officer, Chief Financial Officer, Chief
Operating Officer / Director for Resort Operations,
and the Corporate Counsel (attorney) who is also dual-hatted as
the Chief Privacy Officer. Under this
new leadership, the company was reorganized to better focus on
the three most profitable business
areas: Resort Operations, Reservations Services, and Resort
Affiliates. Management and daily operations
for the three company owned hotel properties (Robenia’s Guest
House, Padgett’s Hotel, and Padgett’s
Beach House), Flintom’s Tavern, and the campgrounds / trailer
parks were transferred to the newly
formed Property Holdings and Development division.
Building a strong management and leadership team is a priority
for both the new CEO and the current
chair of the PBI Board of Directors. In 2017, these two leaders
developed and launched a management
internship program whose participants were recruited from a
select group of colleges and universities.
This program has been very successful in introducing interns
from a variety of backgrounds and career
fields to the challenges and concerns associated with the
cybersecurity needs of Padgett-Beale and its
operations. The next class of management interns has just
started in program and will soon find out
where their first assignment will take them within the company.
CSIA 300: Cybersecurity for Leaders and Managers
Copyright © 2020 by University of Maryland University
College. All Rights Reserved.
Industry Overview
Padgett-Beale, Inc. (PBI) operates in the Hotels, Motels, &
Resorts industry (NAICS Codes 721110
and SIC Codes 7011) (First Research, 2017). Hotels, motels,
and resorts provide short-term housing and
lodging for travelers and visitors. Related services offered by
companies in this industry include: catering
and meals, conferences and event hosting, entertainment, resort
amenities (golf, swimming, spa, etc.),
etc. Major hotels and resorts may also offer a limited spread of
banking services (check cashing,
currency conversion, cash advances, and automated teller
machines). Some facilities may also offer on-
property or in-house medical clinics operated under contract by
licensed medical personnel who provide
non-emergency care for guests and employees.
Hotels, Motels, and Resorts
Leading firms in this industry include Marriott International,
Inc., Hilton Worldwide Holdings,
Inc., and Starwood Hotels & Resorts Worldwide, LLC (First
Research, 2017). On an annual basis, this
global industry generates over $500 billion in revenue. The U.S.
segment of this industry generates
approximately $175 billion in revenues each year. These
revenues may be generated directly from
operation and management of company owned properties. Or,
revenues may be generated through
franchising arrangements or through fees generated in
conjunction with property management / hotel
operations services provided to other property owners.
Demand for products and services in this industry is driven by
two primary factors: (a) business
travel and (b) vacation or tourist travel (First Research, 2017).
Both of these factors are highly sensitive
to the health of regional, national, and global economies.
Financial analysts estimate that 75% of
industry revenues result from fees for overnight lodging. The
remaining 25% of revenues result from
sales of related products and services (e.g. meals, beverages,
etc.). Labor is the most significant source
of expenses. Recent market forecasts (Lodging Staff, 2019)
predict that the industry will experience
continued growth through 2020. In 2021, a slight decline in
revenues is expected followed by a recovery
and slight growth in 2022. No major changes are expected in
either supply or demand in this industry for
the next few years.
This industry uses information technology and the Internet in a
variety of ways. First, most
brands use the Internet and social media to support their
marketing efforts. Second, all but the smallest
of properties / brands use information technologies and the
Internet to support reservation call center
operations. Third, information technologies are used in the daily
operations of facilities (front and back
of house) and in support of corporate business processes and
functions. These technologies include
Point of Sale systems for handling customer financial
transactions, housekeeping and maintenance
management systems, card key access systems for guest rooms
and restricted areas, scheduling and
timekeeping systems for personnel, and building / facilities
management systems that control and
monitor energy using systems such as lighting and
heating/ventilation/cooling (HVAC) systems.
Information technologies are also used to provide physical
security in such forms as video surveillance
and recording, access controls for equipment and control zones
(key pads, badge readers, password
CSIA 300: Cybersecurity for Leaders and Managers
Copyright © 2020 by University of Maryland University
College. All Rights Reserved.
controlled logins), and automated access logs which record
identity information along with
timestamped entry/exit for controlled zones.
Cyber attacks against hotels and hotel chains have increased in
recent years. According to
Winder (2019), recent attacks have exposed not just customer
information but also the security logs
including: passwords, IP addresses of inbound and outbound
connections, information about ports and
protocols for firewalls (open / closed), employee names and
usernames, among others. Major chains
have also experienced malware attacks which exposed the
personal and financial information for
millions of customers (Goud, 2018)
CSIA 300 Cybersecurity for Leaders and Managers
Copyright © 2020 by University of Maryland Global Campus.
All Rights Reserved.
References
First Research. (2017). Hotels, motels, & reports: First
Research custom report. Retrieved July 26, 2017
from Hoovers Online.
Goud, N. (2018, November 30). Data of 500 million Starwood
Marriott hotel customers compromised in
cyber attack. Cybersecurity Insiders. Retrieved from
https://www.cybersecurity-
insiders.com/data-of-500-million-starwood-marriott-hotel-
customers-compromised-in-cyber-
attack/
Lodging Staff (2019, February 25). U. S. lodging outlook good
through 2020, with economic ‘blip’ in 2021
says CBRE. Lodging Magazine. Retrieved from
https://lodgingmagazine.com/u-s-lodging-
outlook-good-through-2020-with-economic-blip-in-2021-says-
cbre/
Philadelphia Consolidated Holding Corp. (2017). Cyber security
liability. Retrieved from
https://www.phly.com/mplDivision/managementLiability/Cyber
Security.aspx
Winder, D. (2019, May 31). Security systems of major hotel
chains exposed by a huge data breach.
Forbes. Retrieved from
https://www.forbes.com/sites/daveywinder/2019/05/31/security-
systems-of-major-hotel-chains-exposed-by-huge-data-
breach/#d022f7f52ec2
Industry OverviewHotels, Motels, and ResortsReferences
Table of Contents.htmlCSIA 300 7381 Cybersecurity for
Leaders and Managers (2218) - Week 2: Integrating Data
Security into Business Operations
1. CSIA 300 - Leadership and Management Study Notes
2. CSIA 300 Padgett-Beale Corporate Profile 2020
CSIA 300 - Leadership and Management Study Note 2020.pdfLE

More Related Content

Similar to CSIA 300 - Leadership and Management Study Note 2020.pdfLE

Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...
Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...
Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...
Cynthia Renée Beck, SCPM, MBA
 
3 Reasons why IBDs need a Fintech strategy
3 Reasons why IBDs need a Fintech strategy3 Reasons why IBDs need a Fintech strategy
3 Reasons why IBDs need a Fintech strategy
Sandhya Krishnamurthy
 
Embracing Cloud Computing for Education Transformation and to Drive Innovatio...
Embracing Cloud Computing for Education Transformation and to Drive Innovatio...Embracing Cloud Computing for Education Transformation and to Drive Innovatio...
Embracing Cloud Computing for Education Transformation and to Drive Innovatio...
Sunil Kempegowda
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
PECB
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
kantarainitiative
 
How kiwi.com transitioned to a remote-only recruiting strategy
How kiwi.com transitioned to a remote-only recruiting strategyHow kiwi.com transitioned to a remote-only recruiting strategy
How kiwi.com transitioned to a remote-only recruiting strategy
Beamery
 
MongoDB World 2019: From Transformation to Innovation: Lean-teams, Continuous...
MongoDB World 2019: From Transformation to Innovation: Lean-teams, Continuous...MongoDB World 2019: From Transformation to Innovation: Lean-teams, Continuous...
MongoDB World 2019: From Transformation to Innovation: Lean-teams, Continuous...
MongoDB
 
PMI Certification
PMI CertificationPMI Certification
PMI Certification
Krystal Green
 
6th Wave members Middle East Digital Ecosystems Living Lab
6th Wave members Middle East Digital Ecosystems Living Lab6th Wave members Middle East Digital Ecosystems Living Lab
6th Wave members Middle East Digital Ecosystems Living Lab
European Network of Living Labs (ENoLL)
 
Introduction to Applied Technologies in emerging technologies in Banking Ind...
 Introduction to Applied Technologies in emerging technologies in Banking Ind... Introduction to Applied Technologies in emerging technologies in Banking Ind...
Introduction to Applied Technologies in emerging technologies in Banking Ind...
seyi20
 
Hdi Capital Area Updates and Presentation April 20 2018
Hdi Capital Area Updates and Presentation April 20 2018Hdi Capital Area Updates and Presentation April 20 2018
Hdi Capital Area Updates and Presentation April 20 2018
hdicapitalarea
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the game
Franco Ferrario
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the game
Franco Ferrario
 
The Implementation of Corporate Knowledge
The Implementation of Corporate KnowledgeThe Implementation of Corporate Knowledge
The Implementation of Corporate Knowledge
Jose Claudio Terra
 
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate OutcomesRetirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
NICSA
 
Rohit Talwar - FCCI and Convention 2020 Presentation to the IMEX Politician'...
Rohit Talwar - FCCI and Convention 2020 Presentation to the  IMEX Politician'...Rohit Talwar - FCCI and Convention 2020 Presentation to the  IMEX Politician'...
Rohit Talwar - FCCI and Convention 2020 Presentation to the IMEX Politician'...
Rohit Talwar
 
Journal of Digital Media Management Case Study
Journal of Digital Media Management Case StudyJournal of Digital Media Management Case Study
Journal of Digital Media Management Case Study
Steven Brier
 
Agile Marketing Engagement Strategies - Digital Industry Networks
Agile Marketing Engagement Strategies - Digital Industry NetworksAgile Marketing Engagement Strategies - Digital Industry Networks
Agile Marketing Engagement Strategies - Digital Industry Networks
Andy McCartney
 
Tech Trends 2015: The fusion of business and IT
Tech Trends 2015: The fusion of business and ITTech Trends 2015: The fusion of business and IT
Tech Trends 2015: The fusion of business and IT
Deloitte United States
 
Social Business Strategy for CIOs: How to Invest Using the Adoption Curve
Social Business Strategy for CIOs: How to Invest Using the Adoption CurveSocial Business Strategy for CIOs: How to Invest Using the Adoption Curve
Social Business Strategy for CIOs: How to Invest Using the Adoption Curve
CSRA, Inc.
 

Similar to CSIA 300 - Leadership and Management Study Note 2020.pdfLE (20)

Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...
Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...
Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...
 
3 Reasons why IBDs need a Fintech strategy
3 Reasons why IBDs need a Fintech strategy3 Reasons why IBDs need a Fintech strategy
3 Reasons why IBDs need a Fintech strategy
 
Embracing Cloud Computing for Education Transformation and to Drive Innovatio...
Embracing Cloud Computing for Education Transformation and to Drive Innovatio...Embracing Cloud Computing for Education Transformation and to Drive Innovatio...
Embracing Cloud Computing for Education Transformation and to Drive Innovatio...
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
How kiwi.com transitioned to a remote-only recruiting strategy
How kiwi.com transitioned to a remote-only recruiting strategyHow kiwi.com transitioned to a remote-only recruiting strategy
How kiwi.com transitioned to a remote-only recruiting strategy
 
MongoDB World 2019: From Transformation to Innovation: Lean-teams, Continuous...
MongoDB World 2019: From Transformation to Innovation: Lean-teams, Continuous...MongoDB World 2019: From Transformation to Innovation: Lean-teams, Continuous...
MongoDB World 2019: From Transformation to Innovation: Lean-teams, Continuous...
 
PMI Certification
PMI CertificationPMI Certification
PMI Certification
 
6th Wave members Middle East Digital Ecosystems Living Lab
6th Wave members Middle East Digital Ecosystems Living Lab6th Wave members Middle East Digital Ecosystems Living Lab
6th Wave members Middle East Digital Ecosystems Living Lab
 
Introduction to Applied Technologies in emerging technologies in Banking Ind...
 Introduction to Applied Technologies in emerging technologies in Banking Ind... Introduction to Applied Technologies in emerging technologies in Banking Ind...
Introduction to Applied Technologies in emerging technologies in Banking Ind...
 
Hdi Capital Area Updates and Presentation April 20 2018
Hdi Capital Area Updates and Presentation April 20 2018Hdi Capital Area Updates and Presentation April 20 2018
Hdi Capital Area Updates and Presentation April 20 2018
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the game
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the game
 
The Implementation of Corporate Knowledge
The Implementation of Corporate KnowledgeThe Implementation of Corporate Knowledge
The Implementation of Corporate Knowledge
 
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate OutcomesRetirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
 
Rohit Talwar - FCCI and Convention 2020 Presentation to the IMEX Politician'...
Rohit Talwar - FCCI and Convention 2020 Presentation to the  IMEX Politician'...Rohit Talwar - FCCI and Convention 2020 Presentation to the  IMEX Politician'...
Rohit Talwar - FCCI and Convention 2020 Presentation to the IMEX Politician'...
 
Journal of Digital Media Management Case Study
Journal of Digital Media Management Case StudyJournal of Digital Media Management Case Study
Journal of Digital Media Management Case Study
 
Agile Marketing Engagement Strategies - Digital Industry Networks
Agile Marketing Engagement Strategies - Digital Industry NetworksAgile Marketing Engagement Strategies - Digital Industry Networks
Agile Marketing Engagement Strategies - Digital Industry Networks
 
Tech Trends 2015: The fusion of business and IT
Tech Trends 2015: The fusion of business and ITTech Trends 2015: The fusion of business and IT
Tech Trends 2015: The fusion of business and IT
 
Social Business Strategy for CIOs: How to Invest Using the Adoption Curve
Social Business Strategy for CIOs: How to Invest Using the Adoption CurveSocial Business Strategy for CIOs: How to Invest Using the Adoption Curve
Social Business Strategy for CIOs: How to Invest Using the Adoption Curve
 

More from MargenePurnell14

Introduction              Ideally, program andor policy interventio.docx
Introduction              Ideally, program andor policy interventio.docxIntroduction              Ideally, program andor policy interventio.docx
Introduction              Ideally, program andor policy interventio.docx
MargenePurnell14
 
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docxINTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
MargenePurnell14
 
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docxIntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
MargenePurnell14
 
IntroductionDefine the individual client or community populati.docx
IntroductionDefine the individual client or community populati.docxIntroductionDefine the individual client or community populati.docx
IntroductionDefine the individual client or community populati.docx
MargenePurnell14
 
Introduction to Public SpeakingWeek 6 AssignmentIn.docx
Introduction to Public SpeakingWeek 6 AssignmentIn.docxIntroduction to Public SpeakingWeek 6 AssignmentIn.docx
Introduction to Public SpeakingWeek 6 AssignmentIn.docx
MargenePurnell14
 
Introduction about topic Intelligence phaseWhat is the .docx
Introduction about topic Intelligence phaseWhat is the .docxIntroduction about topic Intelligence phaseWhat is the .docx
Introduction about topic Intelligence phaseWhat is the .docx
MargenePurnell14
 
Introduction A short summary is provided on the case subject and.docx
Introduction A short summary is provided on the case subject and.docxIntroduction A short summary is provided on the case subject and.docx
Introduction A short summary is provided on the case subject and.docx
MargenePurnell14
 
Introduction Illiteracy is the inability to read and write a.docx
Introduction Illiteracy is the inability to read and write a.docxIntroduction Illiteracy is the inability to read and write a.docx
Introduction Illiteracy is the inability to read and write a.docx
MargenePurnell14
 
Intro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docxIntro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docx
MargenePurnell14
 
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docxIntro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
MargenePurnell14
 
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docxINTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
MargenePurnell14
 
Interview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docxInterview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docx
MargenePurnell14
 
IntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docxIntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docx
MargenePurnell14
 
Interview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docxInterview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docx
MargenePurnell14
 
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docxInternet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
MargenePurnell14
 
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docxInterpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
MargenePurnell14
 
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docxInternet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
MargenePurnell14
 
Interview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docxInterview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docx
MargenePurnell14
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
MargenePurnell14
 
International Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docxInternational Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docx
MargenePurnell14
 

More from MargenePurnell14 (20)

Introduction              Ideally, program andor policy interventio.docx
Introduction              Ideally, program andor policy interventio.docxIntroduction              Ideally, program andor policy interventio.docx
Introduction              Ideally, program andor policy interventio.docx
 
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docxINTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
 
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docxIntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
 
IntroductionDefine the individual client or community populati.docx
IntroductionDefine the individual client or community populati.docxIntroductionDefine the individual client or community populati.docx
IntroductionDefine the individual client or community populati.docx
 
Introduction to Public SpeakingWeek 6 AssignmentIn.docx
Introduction to Public SpeakingWeek 6 AssignmentIn.docxIntroduction to Public SpeakingWeek 6 AssignmentIn.docx
Introduction to Public SpeakingWeek 6 AssignmentIn.docx
 
Introduction about topic Intelligence phaseWhat is the .docx
Introduction about topic Intelligence phaseWhat is the .docxIntroduction about topic Intelligence phaseWhat is the .docx
Introduction about topic Intelligence phaseWhat is the .docx
 
Introduction A short summary is provided on the case subject and.docx
Introduction A short summary is provided on the case subject and.docxIntroduction A short summary is provided on the case subject and.docx
Introduction A short summary is provided on the case subject and.docx
 
Introduction Illiteracy is the inability to read and write a.docx
Introduction Illiteracy is the inability to read and write a.docxIntroduction Illiteracy is the inability to read and write a.docx
Introduction Illiteracy is the inability to read and write a.docx
 
Intro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docxIntro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docx
 
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docxIntro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
 
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docxINTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
 
Interview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docxInterview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docx
 
IntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docxIntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docx
 
Interview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docxInterview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docx
 
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docxInternet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
 
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docxInterpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
 
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docxInternet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
 
Interview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docxInterview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docx
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
International Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docxInternational Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docx
 

Recently uploaded

REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 

Recently uploaded (20)

REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 

CSIA 300 - Leadership and Management Study Note 2020.pdfLE

  • 1. CSIA 300 - Leadership and Management Study Note 2020.pdf LEADERSHIP & MANAGEMENT Study Notes for CSIA 300: Cybersecurity for Leaders and Managers © 2020 by University of Maryland Global Campus. All Rights Reserved. UNDERSTANDING LEADERSHIP From: Northouse, P. G. (2008 ). Introduction to leadership: Concepts and practice (4th ed.). Thousand Oaks, CA: SAGE Publications. From: https://nelsontouchconsulting.wordpress.com/2011/02/22/leader ship-vs-management/ LEADERSHIP IN CYBERSECURITY • Define and articulate a vision • Develop and promote strategy • Motivate, inspire, and empower
  • 2. • Create, invent, integrate solutions • Excellence, Quality, Ethics, Morality INFLUENCING LEADERS • Find a wedge and then widen the crack to open doors for Cybersecurity discussions with the organization’s leaders • Learn to speak their language • Business Leaders think in terms of profits and losses • Government Leaders think in terms of budgets and compliance (legal, regulatory) • Address the twin problems of ignorance and complacency • Cybersecurity is not a well-known quantity outside of CIO and CISO organizations • Seek opportunities to educate peers within the organization • Participate in Governance activities • Contribute to Enterprise Risk Management • Contribute to Business Continuity Planning • Contribute to Budgets, Strategies, and Futures Thinking From: https://nelsontouchconsulting.wordpress.com/2011/02/22/leader ship-vs-management/ ASSETS TO BE MANAGED
  • 3. • Information • Intellectual Property including sensitive business plans, product designs, finances • Information held in trust (customer and vendor) • Information Systems • Workstations • Mobile Devices • Network Security Appliances • Information Infrastructures • Networks • Networking Equipment CYBERSECURITY MANAGEMENT • Threats • Vulnerabilities • Configurations • Patches • Mitigations & Controls • Compliance & Audits • People, Processes, Policies, Plans, Technologies (and quite a bit more!) PROJECT MANAGEMENT • Project Management is concerned with: • Cost • Schedule
  • 4. • Quality • “A project is temporary in that it has a defined beginning and end in time, and therefore defined scope and resources.” • “A project is unique in that it is not a routine operation, but a specific set of operations designed to accomplish a singular goal.” Source: https://www.pmi.org/about/learn-about-pmi/what-is- project-management PROJECT MANAGEMENT • Project management processes fall into five groups: • Initiating • Planning • Executing • Monitoring and Controlling • Closing • Source: https://www.pmi.org/about/learn-about-pmi/what-is- project- management PROJECT MANAGEMENT • Project management knowledge draws on ten areas: 1. Integration
  • 5. 2. Scope 3. Time 4. Cost 5. Quality • Project management knowledge draws on ten areas: 6. Procurement 7. Human resources 8. Communications 9. Risk management 10. Stakeholder management Source: https://www.pmi.org/about/learn-about-pmi/what-is- project-management LEADERSHIP + MANAGEMENT argues that leadership and management involve two distinct but complementary sets of action. Mohindra) • Adapted from https://nelsontouchconsulting.wordpress.com/2011/02/22/leader ship-vs- management/ leadership & managementUnderstanding LeadershipSlide Number 3Leadership in cybersecurityInfluencing leadersSlide Number 6Assets to be managedCybersecurity managementProject ManagementProject managementProject
  • 6. managementLeadership + management CSIA 300 Padgett-Beale Corporate Profile 2020.pdf Copyright © 2020 by University of Maryland Global Campus. All Rights Reserved. CYBERSECURITY MANAGEMENT & POLICY Padgett-Beale, Inc. A case study for Cybersecurity Management & Policy Students Valorie J. King, PhD 1/2/2020 CSIA 300 Cybersecurity for Leaders and Managers Copyright © 2020 by University of Maryland Global Campus. All Rights Reserved. Padgett-Beale Organization Chart -- 2020
  • 7. Figure 1. Padgett-Beale, Inc. Organization Chart CSIA 300: Cybersecurity for Leaders and Managers Copyright © 2020 by University of Maryland University College. All Rights Reserved. Company History Elmer and Robenia Padgett’s first hotel, Robenia’s Guest House, opened in 1925 with six family suites (two per floor), a tea room, and a formal dining room. The guest house primarily served wealthy families who relocated to the seashore for the summer to escape the heat in New York City. This property provided amenities and services matching those of rival long- stay hotels in major cities along the East Coast. The second and third properties, Padgett’s Hotel and Padgett’s Beach House, were acquired in 1935. Flintom’s Tavern, a landmark restaurant and entertainment venue, was added to the Padgett properties portfolio in 1940. Periodic resurgences in popularity of the seashore as a vacation destination occurred over the next fifty years (1940-1990) as bridges were built, roads were improved, and regional economies strengthened. These resurgences brought additional competition as new motels and resorts operated by national chains entered the seashore vacations market. Major weather
  • 8. events in the 1970’s resulted in damage to both Padgett’s Beach House and Flintom’s Tavern causing both to close for an extended period of renovations. The Padgett family’s brand remained strong, despite these setbacks, as members of the family took a personal interest in the day-to-day operations and management of the company. Padgett’s was not an early adopter of computers and information technology. But, over time and as younger family members entered the business, computers began a slow march into the company’s offices in the form of personal computers with word processing, spreadsheets, and database systems. Personal computers also made their way into manager’s offices in the hotel properties where spreadsheets proved valuable in tracking revenues and expenses. In 1982, an embezzlement scandal at Flintom’s Tavern forced the company to adopt computer-based point of sale (POS) systems throughout the company for all cash handling functions (hotel front desks and restaurants). A benefit of the POS systems were the built-in reporting functions, which enabled the company to more closely track cash and credit sales by property. By 1995, the company had fully integrated custom hotel management software into its operations. This software and the associated databases were hosted on company owned / operated mainframe computer systems. By the end of the decade, information technologies were in use to support all aspects of the company’s internal operations (accounting, customer service, property management, and reservations). At the beginning of the new century, the company adopted its first strategic plan with a heavy emphasis
  • 9. upon growth and expansion. Under this plan, the company branched out and began offering hotel and resort management services to other hoteliers and property owners. Advanced telephony services and implementation of custom software allowed Padgett’s to offer one of the first centralized reservations management services. The company also leveraged the Internet and World Wide Web to launch a resort affiliates program, which provided a menu of business related services to member properties. These services included: online advertising and promotions, architecture and design assistance, business operations consulting, group business insurance, and guest loyalty programs. The hotel and resort management services business area continues to be the major source of revenues and profits for the company and its owners. CSIA 300: Cybersecurity for Leaders and Managers Copyright © 2020 by University of Maryland University College. All Rights Reserved. As part of Padgett’s expansion plan, the company purchased Beale Realty Holdings in 2001 and formed Padgett-Beale, Inc. (PBI). Shortly thereafter, PBI embarked on a series of real-estate acquisition activities, which led to the purchase of several large tracts of prime Eastern Shore waterfront property. The company’s long-term plan was to hold the properties as real estate investments and, when market demand rose sufficiently, expand into development, sales, and management of condominiums and vacation time-share properties. The focus on long term
  • 10. investment was a wise choice as this particular market segment was adversely impacted by the housing boom/bust in the mid 2000’s. At the time of purchase, the waterfront properties were in use as campgrounds and resorts for tent- campers, travel-trailers, and motorhomes. These camping facilities were allowed to continue their existing operations with minimal investment and oversight for the next 15 years (2002 – 2017). During this laissez-faire management period, some campground managers modernized their camp offices and stores by purchasing computer-based point of sale systems that allowed them to accept credit and debit cards. Most of these managers also outsourced their reservations management to a third party online reservations system, which provided a customized website to advertise each park and provide access to the online reservations system. A few campgrounds did not modernize beyond setting up a simple website with contact information and a few photographs. These facilities continue to use a mail or telephone-based reservation process with a “cash only” payment policy. In 2015, the day-to-day operations and management of PBI was transitioned to a new leadership team recruited from leading hotel and resort management companies. The new leadership team includes the Chief Executive Officer, Chief Financial Officer, Chief Operating Officer / Director for Resort Operations, and the Corporate Counsel (attorney) who is also dual-hatted as the Chief Privacy Officer. Under this new leadership, the company was reorganized to better focus on the three most profitable business areas: Resort Operations, Reservations Services, and Resort
  • 11. Affiliates. Management and daily operations for the three company owned hotel properties (Robenia’s Guest House, Padgett’s Hotel, and Padgett’s Beach House), Flintom’s Tavern, and the campgrounds / trailer parks were transferred to the newly formed Property Holdings and Development division. Building a strong management and leadership team is a priority for both the new CEO and the current chair of the PBI Board of Directors. In 2017, these two leaders developed and launched a management internship program whose participants were recruited from a select group of colleges and universities. This program has been very successful in introducing interns from a variety of backgrounds and career fields to the challenges and concerns associated with the cybersecurity needs of Padgett-Beale and its operations. The next class of management interns has just started in program and will soon find out where their first assignment will take them within the company. CSIA 300: Cybersecurity for Leaders and Managers Copyright © 2020 by University of Maryland University College. All Rights Reserved. Industry Overview Padgett-Beale, Inc. (PBI) operates in the Hotels, Motels, & Resorts industry (NAICS Codes 721110 and SIC Codes 7011) (First Research, 2017). Hotels, motels, and resorts provide short-term housing and lodging for travelers and visitors. Related services offered by companies in this industry include: catering
  • 12. and meals, conferences and event hosting, entertainment, resort amenities (golf, swimming, spa, etc.), etc. Major hotels and resorts may also offer a limited spread of banking services (check cashing, currency conversion, cash advances, and automated teller machines). Some facilities may also offer on- property or in-house medical clinics operated under contract by licensed medical personnel who provide non-emergency care for guests and employees. Hotels, Motels, and Resorts Leading firms in this industry include Marriott International, Inc., Hilton Worldwide Holdings, Inc., and Starwood Hotels & Resorts Worldwide, LLC (First Research, 2017). On an annual basis, this global industry generates over $500 billion in revenue. The U.S. segment of this industry generates approximately $175 billion in revenues each year. These revenues may be generated directly from operation and management of company owned properties. Or, revenues may be generated through franchising arrangements or through fees generated in conjunction with property management / hotel operations services provided to other property owners. Demand for products and services in this industry is driven by two primary factors: (a) business travel and (b) vacation or tourist travel (First Research, 2017). Both of these factors are highly sensitive to the health of regional, national, and global economies. Financial analysts estimate that 75% of industry revenues result from fees for overnight lodging. The remaining 25% of revenues result from sales of related products and services (e.g. meals, beverages, etc.). Labor is the most significant source
  • 13. of expenses. Recent market forecasts (Lodging Staff, 2019) predict that the industry will experience continued growth through 2020. In 2021, a slight decline in revenues is expected followed by a recovery and slight growth in 2022. No major changes are expected in either supply or demand in this industry for the next few years. This industry uses information technology and the Internet in a variety of ways. First, most brands use the Internet and social media to support their marketing efforts. Second, all but the smallest of properties / brands use information technologies and the Internet to support reservation call center operations. Third, information technologies are used in the daily operations of facilities (front and back of house) and in support of corporate business processes and functions. These technologies include Point of Sale systems for handling customer financial transactions, housekeeping and maintenance management systems, card key access systems for guest rooms and restricted areas, scheduling and timekeeping systems for personnel, and building / facilities management systems that control and monitor energy using systems such as lighting and heating/ventilation/cooling (HVAC) systems. Information technologies are also used to provide physical security in such forms as video surveillance and recording, access controls for equipment and control zones (key pads, badge readers, password CSIA 300: Cybersecurity for Leaders and Managers Copyright © 2020 by University of Maryland University
  • 14. College. All Rights Reserved. controlled logins), and automated access logs which record identity information along with timestamped entry/exit for controlled zones. Cyber attacks against hotels and hotel chains have increased in recent years. According to Winder (2019), recent attacks have exposed not just customer information but also the security logs including: passwords, IP addresses of inbound and outbound connections, information about ports and protocols for firewalls (open / closed), employee names and usernames, among others. Major chains have also experienced malware attacks which exposed the personal and financial information for millions of customers (Goud, 2018) CSIA 300 Cybersecurity for Leaders and Managers Copyright © 2020 by University of Maryland Global Campus. All Rights Reserved. References First Research. (2017). Hotels, motels, & reports: First Research custom report. Retrieved July 26, 2017 from Hoovers Online. Goud, N. (2018, November 30). Data of 500 million Starwood Marriott hotel customers compromised in
  • 15. cyber attack. Cybersecurity Insiders. Retrieved from https://www.cybersecurity- insiders.com/data-of-500-million-starwood-marriott-hotel- customers-compromised-in-cyber- attack/ Lodging Staff (2019, February 25). U. S. lodging outlook good through 2020, with economic ‘blip’ in 2021 says CBRE. Lodging Magazine. Retrieved from https://lodgingmagazine.com/u-s-lodging- outlook-good-through-2020-with-economic-blip-in-2021-says- cbre/ Philadelphia Consolidated Holding Corp. (2017). Cyber security liability. Retrieved from https://www.phly.com/mplDivision/managementLiability/Cyber Security.aspx Winder, D. (2019, May 31). Security systems of major hotel chains exposed by a huge data breach. Forbes. Retrieved from https://www.forbes.com/sites/daveywinder/2019/05/31/security- systems-of-major-hotel-chains-exposed-by-huge-data- breach/#d022f7f52ec2 Industry OverviewHotels, Motels, and ResortsReferences Table of Contents.htmlCSIA 300 7381 Cybersecurity for Leaders and Managers (2218) - Week 2: Integrating Data Security into Business Operations 1. CSIA 300 - Leadership and Management Study Notes 2. CSIA 300 Padgett-Beale Corporate Profile 2020