Preview

The Rookie Chief Iso

Powerful Essays
Open Document
Open Document
3874 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Rookie Chief Iso
229-854-5904

WEEK 10 TERM PAPER
“The Rookie Chief Information Security Officer”
Bradford Daniels
Professor Steven Brown
SEC 402
17 March 2013

1. a. Create an Organization Chart in which you
DANIELS INC CLOUD COMPUTING ORGANIZATIONAL CHART

i. Illustrate the roles that will be required to ensure design, evaluation, implementation, and management of security programs for the organization.
The CISO is the executive responsible for the organization's entire security posture, both physical and digital. CISOs also frequently own or participate closely in related areas such as business continuity planning, loss prevention and fraud prevention, and privacy.
CISO Responsibilities:
Lead operational risk management activities to enhance the value of the company and brand.
Oversee a network of security directors and vendors who safeguard the company's assets, intellectual property and computer systems, as well as the physical safety of employees and visitors.
Identify protection goals, objectives and metrics consistent with corporate strategic plan.
Work with other executives to prioritize security initiatives and spending based on appropriate risk management and/or financial methodology.
Maintain relationships with local, state and federal law enforcement and other related government agencies.
Oversee incident response planning as well as the investigation of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary.
Work with outside consultants as appropriate for independent security audits.
The CSO title is also used at some companies to describe the leader of the "corporate security" function, which includes the physical security and safety of employees, facilities and assets.
Members of the Information Security Team assist the CISO with design, evaluation, implementation, and management of security programs for the organization. ii. Within your organizational chart, clearly



References: Shoemaker. & Conklin A. (2012) Cyber security The Essential Body of Knowledge Boston MA Course Technology Press Risk Assessment Risk Management Guide- Computer Security Retrieved from http://www.csrc.nist.gov Request for Proposal (RFP) Information Technology IT Strategic Plan Retrieved from http:// www ebid.board.com

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Security implementation responsibilities focus on implementing the access controls and account management processes outlined in this Plan. The following positions are responsible for security implementation:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Specify at least three (3) competencies that the CISO could perform using the provided Website titled, “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.”…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    Develop Responsibilities generic procedures to respondto an incedent, determine cuase of incident determine best response to an incident, and protect collected evidence, to ensure that there is noo tampering of evidence.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Write a 1,000- to 1,500-word paper on at least three major information security threats that a specific organization you choose faces today.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 244 Ap C

    • 466 Words
    • 2 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information technology staff can help decrease incidents of security breaches by implementing screen protectors in all computers, by providing logging accreditation to all personnel, by using network security software and hardware, by monitoring the safety of the network and by educating, reporting and enforcing any HIPAA violation.…

    • 672 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    CI/HUMINT Case Study

    • 175 Words
    • 1 Page

    -Perform CI and terrorism threat analysis and assist in the preparation of CI and intelligence studies, orders, estimates, and plans.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    implimenting duty of care

    • 544 Words
    • 2 Pages

    This means having the responsibility for making sure that their organisation upholds the legal requirement to keep their staff safe as providing a safe working environment as well as providing PPE. Keeping staff up to date on all training including reporting and recording procedures.…

    • 544 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays