11 Sep You are a risk management consultant and have been contacted by the chief information officer (CIO) of Workers Werks Credit Union
Analyze the design of a risk mitigation plan for its inclusion of best practices in the field
Identify legal and ethical considerations in risk analysis and mitigation within an information technology environment
Scenario
You are a risk management consultant and have been contacted by the chief information officer (CIO) of Workers Werks Credit Union (WWCU), a mid-size but growing credit union, to conduct an evaluation of its current IT cybersecurity risk management plan. Data privacy is a big concern in the banking sectors, and the CIO is concerned that WWCU’s current plan is outdated and has significant weaknesses.
In your conversation with the CIO, you gather the following information about the situation:
Current plan: The credit union adopted the current cybersecurity risk plan three years ago, but the CIO is concerned about possible gaps in the plan and would like to update it.
Workforce: The credit union has experienced significant revenue growth, and the number of employees with access to its IT infrastructure has grown exponentially in the last five years.
WWCU now has nearly 1,000 users with different levels of access to its central database.
Strategy: The credit union is looking to expand into new markets in the coming year and will need to make significant changes to its IT infrastructure.
Compliance: The CIO is concerned not only about legal compliance but also ethical issues related to the protection of personally identifiable information (PII) of its customers. The company has set these priorities related to legal and ethical compliance:
Address the current legal environment (domestic and international)
Anticipate emerging issues
Meet industry ethical standards
Match best practices for risk planning within the industry
Directions
Risk Analysis Report
The CIO is asking you to prepare a 3–4 page report that evaluates the company’s current IT Security Risk Management Plan, linked in the Supporting Materials section.
The report should contain the following:
Scope: Evaluate the scope and comprehensiveness of the current plan.
How does the plan describe its objectives?
How does the plan balance risk and cost?
In what ways does the plan cover the business objectives end to end?
How does the plan address all stakeholders who could be impacted by a cybersecurity attack?
Risk: Determine how the current plan identifies risks.
How does the plan identify the risks, vulnerabilities, and threats that could impact mission-critical business functions and processes?
How does the plan identify industry-related risks (internal and external)?
Impact: Analyze how the identified risks might impact the organization’s assets.
How does the plan identify key assets and activities that need to be protected?
How does the plan estimate the financial impact of losses?
How does the plan address business continuity and asset replacement?
Mitigation: Evaluate the current plan’s mitigation recommendations.
How effectively does the plan translate the risk assessment into a risk mitigation plan?
How does the plan prioritize risk elements?
Legal Compliance: Assess how the plan addresses legal considerations.
Non-Compliance: Determine how the plan anticipates the implications of non-compliance.
Ethical Considerations: Assess how the plan aligns with current ethical codes within the cybersecurity field.
What to Submit
To complete this project, you must submit the following:
Risk Analysis Report (3–4 pages)
Your report should be 3–4 pages, double spaced, and submitted on a file that your instructor can easily access (.PDF, .doc).
Supporting Materials
The following resource(s) may help support your work on the project:
https://snhu.brightspace.com/content/enforced/1703101-IT-313-14315.202481-1/course_documents/IT%20313%20WWCU%20Security%20Risk%20Management%20Plan.pdf?ou=1703101
WORKERS WERKS CREDIT UNION (WWCU) IT Security Risk Management Plan
Description: This document contains the security risk management plan for software and hardware implementations throughout WWCU. It covers the management of all security-related risks during the implementation life cycle. This is the document you will use to create your analysis report.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.