Preview

Gregg Shafel Case Summary

Good Essays
Open Document
Open Document
422 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gregg Shafel Case Summary
If I had the opportunity to advise Gregg Steinhafel and Target on actions to take to better handle a crisis like the cyber attack they experienced in 2013 I would focus on policy and training development. It seemed alarming to me that a CEO and his top executives disagreed on the best strategy and moved forward without reaching a consensus (Kinicki, 2016). Discrepancies between team members, especially at such a high level, would indicate to me an inconsistent or poorly established culture. Identifying the company's actual values and goals is imperative to then detail the ethical standards, proper course of action, appropriate communications, and resulting training (LeClair, 2000). Establishing these policies would lead to standard expectations in behavior and choices, and uniform culture (LeClair, 2000). …show more content…
Technology innovation and global competition are two essential aspects of modern business, as a result companies invest a great deal in these areas (LeClair, 2000). It is imperative for senior management, like Steinhafel and his senior managers, to identify the information important to their business and which information is most valuable so that they can develop an IT infrastructure to protect those assets and then educate, inform, and train employees in a way that fosters a culture in which security is a priority (Dutta, 2002). With planning, innovation, and training a company can face the ever changing threats of the cyber world with increased confidence and thereby gain the confidence and business of their customers (Dutta,

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Dave Sharland – Mr. Sharland a physical therapist for the North Florida/South Georgia Veteran’s Administration (VA) reported that during his career, he has participated in over 800 physical therapy visits in home settings and been very positive. The Council questioned Mr. Sharland on licensure requirements, technical platform, types of services offered, and patient and patient representative access to services. Mr. Sharland to explain the health care providers working with the VA are only required to obtain a license in one state, but they are limited to providing services to only VA patients. He noted that that necessary technology is sometimes provided directly to patients and that in other instances the patient is responsible for purchasing…

    • 226 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Liaskos, J., & Sandy, G. A. (2004). An evaluation of Internet use policies of Victorian local…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    There were several breakdowns in Target’s security operations. First, the security system was not compliant to the latest standards nor was the architecture robust enough – too many systems were chained together without defenses between them. Second, Target did not make the changes that were suggested to them on multiple fronts, but instead either ignored them completely or did not implement a plan that would last long. Third, the response to the multiple warnings, from both the monitoring system and the security teams, was not enough in comparison to the severity of the warnings. Like most organizations, Target could not predict the kind of attack that would be executed on them; however, had they responded to any of these problems directly and more carefully, they could have stopped the breach much sooner.3.…

    • 523 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    In the IT sector especially, employers seek future employees with a wide knowledge of security systems and basic knowledge of how to keep safe on the internet. This says that you would know what you are doing while using the internet and can handle the maintenance needed to keep a computer safe and up to date while using a variety of software. In addition this will mean that you are very aware of issues and threats which can make you a…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Today, the company's operations on the market require a rapid response to changes and continuous adaptation to new challenges arising from both competition and above all increasingly demanding customers. In addition, the need to operate in conditions of globalization relates not only to large corporations for years operating on the world market, but also the SME sector. This became possible due to the development of ICT - that these technologies have existing boundaries and distance become irrelevant. Modern systems can not only facilitate the core business, specific to a particular company, but also enhance security areas this activity and, consequently, management of the entire company. Comprehensive computerization allows the company…

    • 1144 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Nothing

    • 634 Words
    • 4 Pages

    To integrate the professional qualification, skills and work experience in security administration and Information Technology with my personal interest and drive in the emerging concepts of security administration and Information Technology for a challenging and enriching journey ultimately leading to the value addition to the organizational goals.…

    • 634 Words
    • 4 Pages
    Satisfactory Essays