Preview

Dlis Risk Mitigation Draft

Satisfactory Essays
Open Document
Open Document
566 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dlis Risk Mitigation Draft
Risk Management Draft | IS-305 ITT-Tech Columbus,OH | | M. Passavant | 4/10/2013 |

1. Intro
This risk management plan was called into development by the DLIS or the Defense Logistics Information Agency, a sub organization of the Defense Logistics Agency. Senior management at the DLIS has determined that the previous risk management plan for the organization is out of date and that a new risk management plan must be developed. Due to the importance of risk management to our organization, senior management is committed to and supportive of this project to develop a new plan.
2. Outline

Intro1
Outline2
Scope3
Laws and Regulations4
Responsible Individuals5
Schedule6
Risk management Report………………………………………………………………………………………………………………………7
3. Scope
This plan as sanctioned by senior management of the DLIS will cover compliance laws and regulations that pertain to our organization. It will identify key roles and responsibilities of individuals and departments within the organization as they pertain to risk management. It will develop a proposed schedule for risk management’s planning process, and finally it will deliver a professional report detailing the information above for any interested parties.

4. Summary of Compliance laws and Regulations
A. FISMA I.FISMA is the Federal Information Security Management act developed to ensure that federal agencies protect their data. II. To be compliant with FISMA we must Develop an agency wide program to provide information security and have annual inspections to determine the effectiveness of our program.
B.COBIT
I. Control Objectives for Information and Related Technology, contains good practices for IT management provided by ISACA. Provides a extensive framework for ensuring your IT is being used to support your organization in the best possible manner.
5. Key Responsible Individuals
A. IT manager –planning, budgeting, performance of information systems security
B. Senior Management-

You May Also Find These Documents Helpful

  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    To reduce the impact of workplace risks in the Biz Ops corporation we need to look at any incidents or accidents that have occurred in the past, and assess whether the changes have been effective or if any changes need to be made to the current procedures. We also need to look at the current operating procedures and into future operations to update any changes we need to incorporate and set out a plan to put these procedures in place. All activities need to be assessed prior to making any changes and risk managed throughout with regular training, monitoring, auditing and reporting processes carried out. All employees are responsible for applying risk management principles and practices in their respective work areas…

    • 361 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Is4550 Week5 Assignment1

    • 282 Words
    • 3 Pages

    organization. Also describe what an automated IT security policy compliance system would look like for…

    • 282 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Health and Safety Unit 306

    • 1076 Words
    • 5 Pages

    Where risks are identified, practical codes, standards of working and guidance on proper conduct will be complied and implemented according to risk assessments. The group will ensure on adequate level of supervision to deal with the day…

    • 1076 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The purpose of the Risk Management Plan is to provide guidelines and methods to assure that the broad range of both administrative and clinical activities at the facility are monitored and coordinated in order to reduce losses associated with consumer, employee, or visitor injuries, property loss or damage and other sources of potential facility liability.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The employer should carry out suitable and sufficient risk assessments and put control measures in place. If need be, competent persons may be engaged to enable the employer implement these measures. Staff shall be provided information on risks and the employer shall see that employees ate trained and competent to carry out all…

    • 853 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The Federal Information Act (FISMA) was made a law in 2002. The law is defined to protect government information, operations and assets against natural or manmade threats. This act requires officials of all government programs to conduct annual reviews to make sure that all risks are kept below the acceptable level.…

    • 496 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    * Craft an executive summary that addresses the risk assessment findings, risk assessment impact, and recommendations to remediate areas of non-compliance…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week6Assignmentrubric

    • 436 Words
    • 2 Pages

    * All key elements of the assignment are covered in a substantive way. The Riordan Corporate Compliance Plan completes the following: *…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Management Plan Final

    • 7114 Words
    • 23 Pages

    A risk is the probability of the loss of a valued resource. The impact of the loss could be in profitability, functionality and/or reputation. Threats are any circumstance or events that have the potential to harm the information technology system. Vulnerability refers to a weakness in the security system. Risk Management is the process of identifying, assessing, responding to, monitoring, and reporting risks, threats and vulnerabilities. This Risk Management Plan defines how risks associated with the Defense Logistics Information Service will be identified, analyzed, and managed. It outlines how risk management activities will be performed, recorded, and monitored for the DLIS providing templates and practices for recording and prioritizing risks.…

    • 7114 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    FISMA Analysis Paper

    • 1671 Words
    • 7 Pages

    FISMA necessitates compliance for all data and information systems, under the governments control and all data and systems that are provided by others outside the public domain (GovITWiki, 2008). Data that is provided by others to governmental agencies must strive to protect those systems operations, and assets, and provide continuity in system reporting and other requirements (IBM, 2007).…

    • 1671 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Information technology (IT) controls are particular functions performed by employees and operating systems specifically designed to ensure business objectives and goals are met. Although IT controls are different than internal controls both are vital functions of an organization that are both reported and evaluated on a regular basis. IT control objectives are based on confidentiality, integrity, data available, and general management of IT functions of the organization. IT general and application controls are based on information technology environment, system operations, and program data, development, and changes.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Best Essays

    The risk register has been made for all these risk with the assumed likelihood and impact to the organisation, which is then explained below. The mitigation for each of these risks are then elaborated.…

    • 3010 Words
    • 13 Pages
    Best Essays
  • Good Essays

    Risk Management Plan

    • 409 Words
    • 2 Pages

    Lastly, update or create new policy and procedures as they relate to identified risks. Policy and procedures should be reviewed periodically and revised when necessary. Delegate tasks to staff members therefore they have a shared responsibility in keeping the risk management active and ongoing. Everyone's responsibility should be clearly stated at the beginning of delegating…

    • 409 Words
    • 2 Pages
    Good Essays
  • Best Essays

    National Institute of Standards and Technology (NIST). (2008, March 4). 'federal information security management act of 2002 '. Retrieved from http://csrc.nist.gov/drivers/documents/FISMA-final.pdf…

    • 4365 Words
    • 18 Pages
    Best Essays