Student: Stanley

Assignment 1: Developing the Corporate Strategy for Information Security

Due Week 4 and worth 100 points Imagine that you are working for a startup technology organization that has had overnight success. The organization's immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy. As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization's data assets. Review the following website titled, "Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development," located at, for additional information necessary to complete this assignment you may use, and it is encouraged to find additional sources for corroboration, or fresh ideas. I suggest no less than three additional sources. Write an essay with no less than five pages in which you address which C-level function you would recommend at the top of the information security position, lay out his or her main function, and how he or she would delegate responsibilities by next level management, to include what competencies the individuals had and why. Note: The above and what follows are guidelines. That is they are not to be answered, necessarily linearly, nor like short exam answers that must be answered. This is an essay, meaning you decide what needs to be covered and why, based on the overall lessons you want the reader to take away. In this case the lessons may be a summary conclusion as it is more of an informational analytical paper than one that is drawing lessons and recommendations. There are things you might want to work into the paper. Will you have a security strategic plan, if so why and what types of things would you include. Describe how the digital forensics function complements the overall security efforts of the organization. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry. Other possible considerations, depending on your approach could include the following. Apply any of the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. Include best practices in cybersecurity. Identify and analyze the role of the Chief Information Officer, Information Security Officer, and IT Security Compliance Officer in the context of cybersecurity. Compare and contrast the functional roles of an organization in the context of cybersecurity. Describe the corollary roles of security in an enterprise. Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies. Use technology and information resources to research issues in cybersecurity. Your assignment must follow these formatting requirements: • This includes proper use of grammar; and APA standards for style. For proofreading default to the comments from the first paper; and the documents I proved below. • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length, I set noe maximum for the paper as it is as long or as short as necessary, don't sacrifice clarity for brevity. • Have a clear introduction based on what you present and document in the body, and drafted/revised last to reflect the actual paper. A conclusion that provides a clear and concise summary of what your security plan and organization will be, and a strong closing statement. The specific course learning outcomes associated with this assignment are: • Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions. • Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Click here to access the rubric for this assignment. Dr. G's References: Note, some of the examples are in Chicago Turabian style, but are applicable to APA, all one has to do is follow the guideline, and put the citation in the proper APA formatting.

Budget: $20.00

Due on: May 03, 2020 00:00

Posted: 12 months ago.

Answers (0)