SlideShare a Scribd company logo
Title: Developing the Corporate Strategy for Information
Security
Imagine that you are working for a startup technology
organization that has had overnight success. The organization’s
immediate growth requires for it to formulate a corporate
strategy for information security. You have been recruited to
serve as part of a team that will develop this strategy.
As part of the Information Security Strategy development, you
are required to define specific Information Technology Security
roles that will optimize and secure the organization’s data
assets.
Review the “Cybersecurity: The Essential Body of Knowledge
(EBK)” textbook for information necessary to complete this
assignment.
Write a five to seven (5-7) page paper in which you do the
following, based on the scenario described below:
1. The Chief Information Security Officer (CISO) is responsible
for several functions within an organization.
a. Examine three (3) specific functions a CISO and provide
examples of when a CISO would execute these functions within
the organization.
b. Specify at least three (3) competencies that the CISO could
perform using the provided Website titled, Information
Technology
(IT) Security Essential Body of Knowledge (EBK): A
Competency and Functional Frame-work for IT Security
Workforce Development.”
2. The Chief Information Officer (CIO) is responsible for
several accountability functions within an organization:
a. Identify at least four (4) functions of the CIO using the
EBK as a guide. Provide examples of how the CIO would
execute these functions within an organization.
b. Classify at least two (2) security assurances that could be
achieved by the CIO developing a formal security awareness,
training, and educational program.
c. Suggest methods, processes, or technologies that can be
used by the CIO to certify the security functions and data assets
of an organization on a day-to-day basis.
3. Describe how the digital forensics function complements the
overall security efforts of the organization.
4. Evaluate the operational duties of digital forensic personnel
and how these help qualify the integrity of forensic
investigations within the enterprise and industry.
5. List at least three (3) technical resources available to the
digital forensics professional to perform forensic audits and
investigations.
6. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Title Developing the Corporate Strategy for Information Securit

More Related Content

Similar to Title Developing the Corporate Strategy for Information Securit

This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
gasciognecaren
 
The Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxThe Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docx
Komlin1
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
Robinson069
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
GeorgeDixon99
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
McdonaldRyan39
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
elinoraudley582231
 
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docxCyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
theodorelove43763
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
donaldzs56
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
robertleses9
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
robertlesew96
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
Robinson075
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
sholingarjosh63
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
Stephenson06
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
manningchassidy
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
eleanorabarrington
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
jhonklinz11
 
CIS 560 Entire Course NEW
CIS 560 Entire Course NEWCIS 560 Entire Course NEW
CIS 560 Entire Course NEW
shyamuopuop
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
ogglili
 
These are discussion questions (4).  Need short response to each o.docx
These are discussion questions (4).  Need short response to each o.docxThese are discussion questions (4).  Need short response to each o.docx
These are discussion questions (4).  Need short response to each o.docx
alisoncarleen
 
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docxCYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
alanrgibson41217
 

Similar to Title Developing the Corporate Strategy for Information Securit (20)

This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
 
The Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxThe Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docx
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docxCyber Security wk 8 paperAssignment 2 Implementing Network a.docx
Cyber Security wk 8 paperAssignment 2 Implementing Network a.docx
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
CIS 560 Entire Course NEW
CIS 560 Entire Course NEWCIS 560 Entire Course NEW
CIS 560 Entire Course NEW
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
These are discussion questions (4).  Need short response to each o.docx
These are discussion questions (4).  Need short response to each o.docxThese are discussion questions (4).  Need short response to each o.docx
These are discussion questions (4).  Need short response to each o.docx
 
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docxCYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
CYB 100 Week 1 Defining the Cyber DomainIndividual Defining t.docx
 

More from marilynnhoare

1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docx1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docx
marilynnhoare
 
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
marilynnhoare
 
1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docx1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docx
marilynnhoare
 
1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docx1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docx
marilynnhoare
 
1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docx1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docx
marilynnhoare
 
1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx
marilynnhoare
 
.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docx.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docx
marilynnhoare
 
.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docx.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docx
marilynnhoare
 
.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docx.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docx
marilynnhoare
 
.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docx.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docx
marilynnhoare
 
.three pages minimum topic Life Long Learning of Engineering i.docx
.three pages minimum topic  Life Long Learning of Engineering i.docx.three pages minimum topic  Life Long Learning of Engineering i.docx
.three pages minimum topic Life Long Learning of Engineering i.docx
marilynnhoare
 
.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docx.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docx
marilynnhoare
 
.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docx.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docx
marilynnhoare
 
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
marilynnhoare
 
.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docx.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docx
marilynnhoare
 
.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docx.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docx
marilynnhoare
 
. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docx. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docx
marilynnhoare
 
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
marilynnhoare
 
. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docx. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docx
marilynnhoare
 
-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docx-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docx
marilynnhoare
 

More from marilynnhoare (20)

1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docx1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docx
 
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
 
1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docx1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docx
 
1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docx1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docx
 
1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docx1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docx
 
1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx
 
.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docx.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docx
 
.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docx.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docx
 
.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docx.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docx
 
.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docx.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docx
 
.three pages minimum topic Life Long Learning of Engineering i.docx
.three pages minimum topic  Life Long Learning of Engineering i.docx.three pages minimum topic  Life Long Learning of Engineering i.docx
.three pages minimum topic Life Long Learning of Engineering i.docx
 
.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docx.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docx
 
.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docx.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docx
 
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
 
.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docx.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docx
 
.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docx.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docx
 
. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docx. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docx
 
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
 
. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docx. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docx
 
-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docx-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docx
 

Recently uploaded

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

Title Developing the Corporate Strategy for Information Securit

  • 1. Title: Developing the Corporate Strategy for Information Security Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy. As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization’s data assets. Review the “Cybersecurity: The Essential Body of Knowledge (EBK)” textbook for information necessary to complete this assignment. Write a five to seven (5-7) page paper in which you do the following, based on the scenario described below: 1. The Chief Information Security Officer (CISO) is responsible for several functions within an organization. a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization. b. Specify at least three (3) competencies that the CISO could perform using the provided Website titled, Information Technology (IT) Security Essential Body of Knowledge (EBK): A
  • 2. Competency and Functional Frame-work for IT Security Workforce Development.” 2. The Chief Information Officer (CIO) is responsible for several accountability functions within an organization: a. Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization. b. Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. c. Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis. 3. Describe how the digital forensics function complements the overall security efforts of the organization. 4. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry. 5. List at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations. 6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.