Preview

Dlis Risk Mitigation Draft

Satisfactory Essays
Open Document
Open Document
566 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dlis Risk Mitigation Draft
Risk Management Draft | IS-305 ITT-Tech Columbus,OH | | M. Passavant | 4/10/2013 |

1. Intro
This risk management plan was called into development by the DLIS or the Defense Logistics Information Agency, a sub organization of the Defense Logistics Agency. Senior management at the DLIS has determined that the previous risk management plan for the organization is out of date and that a new risk management plan must be developed. Due to the importance of risk management to our organization, senior management is committed to and supportive of this project to develop a new plan.
2. Outline

Intro1
Outline2
Scope3
Laws and Regulations4
Responsible Individuals5
Schedule6
Risk management Report………………………………………………………………………………………………………………………7
3. Scope
This plan as sanctioned by senior management of the DLIS will cover compliance laws and regulations that pertain to our organization. It will identify key roles and responsibilities of individuals and departments within the organization as they pertain to risk management. It will develop a proposed schedule for risk management’s planning process, and finally it will deliver a professional report detailing the information above for any interested parties.

4. Summary of Compliance laws and Regulations
A. FISMA I.FISMA is the Federal Information Security Management act developed to ensure that federal agencies protect their data. II. To be compliant with FISMA we must Develop an agency wide program to provide information security and have annual inspections to determine the effectiveness of our program.
B.COBIT
I. Control Objectives for Information and Related Technology, contains good practices for IT management provided by ISACA. Provides a extensive framework for ensuring your IT is being used to support your organization in the best possible manner.
5. Key Responsible Individuals
A. IT manager –planning, budgeting, performance of information systems security
B. Senior Management-

You May Also Find These Documents Helpful

  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Project Part 2 Task 2

    • 461 Words
    • 2 Pages

    will concentrate on the headquarters of DLIS. The Defense Logistics Information Service currently operates 25 file servers and manages a dozen different databases which incorporate all business functions including payroll with electronic funds transfer capability centered in Battle Creek Michigan. There should be a warm site in place at least between 100 to 200 miles away from this location.…

    • 461 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The objective of this training is for all branch managers to learn how to use the New Compliance System and the policies so they can go back to their employees and new employees to explain the new system and policy accurately so every department’s work will be done accurately and to…

    • 645 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week6Assignmentrubric

    • 436 Words
    • 2 Pages

    * All key elements of the assignment are covered in a substantive way. The Riordan Corporate Compliance Plan completes the following: *…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of the Risk Management Plan is to provide guidelines and methods to assure that the broad range of both administrative and clinical activities at the facility are monitored and coordinated in order to reduce losses associated with consumer, employee, or visitor injuries, property loss or damage and other sources of potential facility liability.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Supply Disruption  Customer Disruption  Employee Disruption Communication Utilities Contingency Planning Process High Level Contingency and Disaster Recovery Planning Strategy • Develop the Business Contingency Planning • • • • • • • Policy and Business Process Priorities Conduct a Risk Assessment Conduct the Business Impact Analysis (BIA) Develop Business Continuity and Recovery Strategies Develop Business Continuity Plans Conduct awareness, testing, and training of the DRP Conduct Disaster Recovery Plan maintenance and exercise Identify business processes Industry Standards ISO 27001 : Requirements for Information Security Management Systems. Section 14 addresses business continuity management.…

    • 1114 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Additionally, the departments are to take steps to protect the identified infrastructure and resources (U.S. Government Printing Office, 2008). The directive identifies important infrastructure and major resource sectors and assigning responsibility for each. It mandated the Department of Homeland Security to coordinate the overall program. The directive gives instructions to the federal departments to develop guidelines for protecting critical infrastructure as well as key resources from cyber-attacks.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Best Essays

    The risk register has been made for all these risk with the assumed likelihood and impact to the organisation, which is then explained below. The mitigation for each of these risks are then elaborated.…

    • 3010 Words
    • 13 Pages
    Best Essays
  • Powerful Essays

    FISMA Analysis Paper

    • 1671 Words
    • 7 Pages

    Agencies must produce a total, accurate, and complete assessment of all information and systems including security status, risk, and remediation (IBM, 2007). However, this can be very taxing when systems are “spread across many organizations and geographies” (IBM, 2007, 4.)…

    • 1671 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    * Craft an executive summary that addresses the risk assessment findings, risk assessment impact, and recommendations to remediate areas of non-compliance…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    2.4 Complete records and reports on health, safety and risk management issues according to legislative and organizational requirements. 3.1 Contribute to development of policies, procedures and practices to identify, assess and manage risk to individuals and others. 3.2 Work with individuals and others to assess potential risks and hazards. 3.3 Work with individuals and others to manage potential risks and hazards.…

    • 3338 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    The five Project Management Process Groups is a breakdown of typical project management lifecycle. It describes and organizes the project from the start to the end of the project. By breaking down the activities into a group of processes, it makes a seemingly huge project more manageable and easier to handle.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Risk Assessment Task 1

    • 4662 Words
    • 26 Pages

    The Assessment Task is due on the date specified by your assessor. Any variations to this…

    • 4662 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    Freedom of Information Act

    • 2110 Words
    • 9 Pages

    The Foreign Intelligence Surveillance Act (FISA) was enacted in 1978 and authorized procedures for the collection of foreign intelligence through physical and electronic surveillance of foreign powers and agents of foreign powers. The Act set up a specific court, the Foreign Intelligence Surveillance Court (FISC), to review and approve requests for surveillance warrants by various government agencies. FISA required individual warrants from the FISC for every surveillance target with a 72-hour grace period to acquire that warrant in exigent circumstances. The goal of FISA was to provide judicial and congressional oversight of secret government surveillance for intelligence gathering.…

    • 2110 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Risk Management Sample

    • 1064 Words
    • 5 Pages

    • Coordinate with SMEs to review and recommend to the Project Manager changes on the overall risk management approach based on lessons learned.…

    • 1064 Words
    • 5 Pages
    Powerful Essays