KINDLY WHEN USE APA AND IN TEXT CITATION THANKS A LOT1) DISCUSSION BOARD (200 WORDS)As the new Chief Information Security Officer for CB Drifter Technologies, you have been...

1 answer below »









KINDLY WHEN USE APA AND IN TEXT CITATION THANKS A LOT

































1) DISCUSSION BOARD (200 WORDS)










As the new Chief Information Security Officer for CB Drifter Technologies, you have been asked by the CEO and CTO to start a discussion with the senior staff on the following:




1) What are the 5 new elements of the Information Security Governance framework. Describe each in 2-3 sentences.




Ideally the information security governance framework aligns with the organizational governance framework and considers internal and external factors shaping the security program leading to the next required discussion question:




2) What are the external and internal drivers that help shape a corporate security program? Describe each in 2-3 sentences.







2) INDIVIDUAL PROJECT (800 WORDS)




Review the followingLinkedIn Learning videosto help you with your assignments in this Unit.




The first product requested of you as the CCISO by the CB Drifter Technology senior staff is to detail the organization’s security governance in a document, referred to as a security program plan or security charter. This security charter, a 4 page MS Word document, should show how the security program aligns with the goals and governance of the organization.







Paper Format:







  • Title page (does not count towards page length requirement). Use "CB Drifter Technology Security Charter" as document title.



  • Security vision



  • Security mission



  • Security scope



  • Strategic security objectives



  • Security responsibilities



  • Security principles



  • Corporate and management commitment



  • Evaluate and renewal requirements



Answered 6 days AfterDec 05, 2022

Answer To: KINDLY WHEN USE APA AND IN TEXT CITATION THANKS A LOT1) DISCUSSION BOARD...

Shubham answered on Dec 07 2022
38 Votes
Discussion Board
Question 1
The 5 new elements of the Information Security Governance framework are:
I
dentify: It includes identifying software and physical assets for conducting supply chain assessment for the development of the strategy for supply chain risk. The process includes identification of asset vulnerability and security policies for establishing the risk management strategy includes risk tolerances. It includes asset discovery and access management for ensuring cloud security and business resiliency services. It is important for considering of the place in the supply chain and interacting with customers.
Protect: It is important for ensuring identity management and helps in empowering staff for training and awareness (Zaydi & Nassereddine, 2021). This function is serving for safeguarding the delivery of critical infrastructure services. It allows in managing and describes all impact of cyber security events. It includes the function for educating and empowering employees for understanding responsibilities and roles for the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here