Infotech importance in strategic planning

profileMina

Discussion:

 

Data collection, analysis, and application is big business. This is the foundation of business intelligence. This week I’d like for you to share here what your experiences are with big data and the businesses that use it. You may feel that the data Facebook collects on you is invasive or beneficial. You may look at what the government has on you threatening or reassuring (since they have even more on the bad guys). Now don’t everyone go picking on Facebook and Google. You don’t even need to make this personal. Business intelligence could be data about competitors. It can be business or government. The list is long, and I’d like to see some creative thinking out there.

Even in my industry, Cybersecurity, there are many cyber threat intelligence sources that I access daily to know what’s going on in the world that could be threatening my Bank. It’s my job to protect your money. What would you think of a CISO that didn’t keep a finger on the pulse of malicious activity in the financial sector? What types of threats affect your business and where do you go for information about that? Get creative out there!

300 words APA format with intext citations and references.

  • Posted: 3 days ago
  • Due: 
  • Budget: $5
Tags: Hours
Answers 1
  • Answers
    Answer rating:5Stars out of1ratings

Purchase the answer to view it

blurred-text
  • Prepare a response where you answer the following questions about the company you work for or an organization with which you are closely affiliated. You may need to contact the IT …

  • Rated 1 times

    assignment help

    Read case studies 1-1 and 1-2 and answer the following questions:

    1. What is one key takeaway on what to do and what not to do when it comes to technological innovation for each case of Google …

  • The following is a summary of things to know when creating an annotated bibliography based on APA Style:

    • The annotated bibliography consists of two elements o Citation in current APA …

  • Rated 1 times

    Question to Answer.

    In Chapter 1 of your textbook - Page 30/31 - Lego Case Study. (PFA Text Book)

    I need just answers to the below questions. (Each question 120 - 150 words)


    1) How did the …

  • Read case study 5-1 SantaCruz Bicycles (Text Book attached). How could incrementalor radical change be used in your organization or in an organization with which you are familiar? What …

  • After you have read Chapter 7 (Textbook attached)read Case Study 7-2 Sony Pictures: The Criminals Won. Answer question 2 What access and data protection controls would you recommend Sony use to …

  • requirement attached in the document

  • After you have read Chapter 3 and Case Study 3-2 The FBI (Textbook attached). Answer question 1. What do you think were the real reasons why the VCF system failed?

    Note: All posts …

  • Please take a moment to share your thoughts, ideas, comments and / or questions concerning Week 4's lecture.


    1. Answer must be in the APA format.
    2. Do not talk about Virtual teams pick something …

  • Rated 1 times

    Discussion

    Privacy, Ethics, and Social Responsibility

    What does it mean to you when you think about your privacy rights? Should you even have an expectation of privacy in today’s electronic world? This …