24 Feb Managing and Assessing Information Security Policy
The Information Security Blueprint is the basis for the design, selection, and implementation of all security program elements. The blueprint builds on top of the organization’s information security policies and it is a scalable, upgradable, comprehensive plan to meet the organization’s current and future information security needs. The blueprint is a detailed version of the information security framework, which is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization. Security education and training is an important part of the Information Security Blueprint.
Module 4 Video
Case Assignment
Search the Web for security education and training programs in your area. Keep a list and categorize the types of training offered. Determine the costs associated with each. Is the training general or for a specific security certification? Assess the cost effectiveness of the training both in terms of both time and money.
Assignment Expectations
Describe your results. Put them in a table describing the training program and cost. You will assess the programs in terms of time, money, and effectiveness. Summarize with a discussion of the key characteristics for Web security and training programs.
You are required to make effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Please use the Trident APA 7 Guide at https://careered.libguides.com/tui/library/apa for proper formatting and style.
Module 4 – Resources
Managing and Assessing Information Security Policy
Required Reading
Blum, D. (2021). Rational Cybersecurity for Business: The Security Leaders’ Guide to Business Alignment, Apress. Chapter 5-9. Finding Skillsoft Books
(2022) Cybersecurity 101: Auditing & Incident Response. Course. 1st half of course. Finding Skillsoft Books
(2022). Cybersecurity Awareness: Getting Started with Security Foundations. 1st half of course. Finding Skillsoft Books
De Freminville, Marie (2020). Cybersecurity and Decision Makers: Data Security and Digital Trust, Wiley Chapter 3,4,5, and 6. Finding Skillsoft Books
Smallwood, R. F. (2020). Information Governance: Concepts, Strategies and Best Practices, Second Edition. Wiley-VCH. Chapters 1 – 5. Finding Skillsoft Books
Optional Reading
Gregory, P. H. (07/24/2019). CISM® : Certified information security manager practice exams McGraw-Hill. Chapter 4
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.