Establishing a Cybersecurity RoadmapRipple32
In this assignment, students will apply all concepts learned throughout the course. Students will clearly communicate their understanding of what is required to secure an organization's most critical assets.
In a 750- to 1000-word paper, describe the main components of a 1- to 3-year strategic plan you would present to your organization's senior leadership for consideration and implementation. You may choose to do this for a federal agency or an organization from the private sector. Make sure to address the following:
- Name five critical policies you feel the organization should have and why they are important
- Name five critical risks most organizations face and how they can be addressed
- What framework or certification process would you recommend the organization implement and why?
- Indicate time, resources, and technology that may be required as part of the implementation process
Make sure to reference academic or NIST official publications (most current year available via the Internet) or other relevant sources published within the last 5 years.
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
- 2 years ago
- Discussion Board Question Unit II
- write 300 words
- FOR phyllis young ONLY Essay – Exploring Ancient Mysteries
- i posted instruc.
- FOR A-PLUS WRITER ONLY!
- IS stategic
- Channel Issues for Discussion Assignment 1
- answer 3 macro econ questions and do some calculation
- De donde son kos reyes de espana
- NURSING RESEARCH PAPER
Identify a SMB of your choice. In a 500-word paper, examine risk management approaches the organization may consider deploying for mobile device management and provide rationale for the …2 months ago
- NOT RATED3 years ago
- NOT RATED
Identify a SMB of your choice. In a 500-word paper, examine risk management approaches the organization may consider deploying for mobile device management and provide rationale …2 years ago
- NOT RATED
Cybersecurity professionals need to know the differences in the tools used to automate network defense and cybersecurity attacks by hackers in order to properly form strategic defense …4 months ago