Develop an ″intake″ briefing for middle managers who will be assisting in the planning and execution of an internal audit of employee use of company owned laptops as part of the company′s ″Work From Home″ arrangements.

Words: 33
Pages: 1
Subject: Uncategorized

Your task: Develop an ″intake″ briefing for middle managers who will be assisting in the planning and execution of an internal audit of employee use of company owned laptops as part of the company′s ″Work From Home″ arrangements. The purpose of an ″intake″ briefing is to get everyone ″on the same page″ with respect to what will be done, who will do it, and what the roles & responsibilities of the managers will be during the audit (e.g. assist with employee contacts and ″smooth ruffled feathers″ amongst their workers). Background: The purpose of the audit is to determine how the laptops are being used by the employees working from home (what corporate and non corporate systems, services, networks, and websites are being accessed) and to uncover, if possible, any misuse (e.g. usage that is outside of the company′s acceptable use policy). The audit should also look for evidence of laptops that are improperly configured or have vulnerable software installed. Background: The company will follow the Information System Security Audit Process as defined by Harris & Maymi in the CISSP All-in-One Exam Guide, 8th edition. The steps are: Determine Goals Involve the right business unit leaders Determine the scope Choose the audit team Plan the audit Conduct the audit Document the results Communicate the results First order Format: this week, your deliverable should be formatted as briefing paper (you will have a combination of paragraphs and bullet points). You should have an introduction, ″analysis″ section (explaining the ground rules and processes for how the audit will be conducted), and an appropriate summary section (including an appeal for cooperation and assistance). Include citations (in the text) and references (at the end) to support your work and allow your readers to fact check your analysis and conclusions. Your task: You have been asked to give a presentation at Business Round Table Event. Attendees are owners of small businesses and corporate managers whose employees are now working from home due to the global pandemic. The need for physical security to protect equipment and other assets has risen in priority for these business owners and managers as they realize that they have a gap in their business continuity planning and response which needs to be addressed. Background: During the global pandemic, many companies throughout the region, both small businesses and larger corporate entities, successfully transitioned to ″work from home″ allowing them to continue operating despite the issuance of ″work from home″ and ″stay at home″ orders from governmental entities. Storefronts and offices for non-essential businesses and services were shuttered or reduced to minimal staffing. Concerns about the potential for thefts, break-ins, and other forms of unauthorized entry have been raised in many organizations who were not prepared for extended periods in which their facilities would be unoccupied / unattended. For this presentation, identify and discuss five or more technologies and countermeasures which can be implemented to address the problem of providing physical security in an unoccupied/unattended facility (you should not propose any measures that rely upon guards or other personnel who would need to be physically present). Your presentation should address both preventive and detective controls for physical security, e.g. perimeter fencing, gates, bollards, lighting, CCTV, audio scanning, alarm systems, key-card controlled entry, etc. Format: This week, the format for your deliverable (posting) will be ″Talking Points.″ Talking points are presented in outline format and contain the content that you would put on slides in a slide deck. Your outline should include 5 to 7 major points (″slide titles″) followed by 3 to 5 supporting points for each. Remember to put enough information into the talking points that your peer reviewers can understand what you intend to cover in each section of your briefing. Remember to introduce the topic at the beginning, present your analysis, and then close your briefing with an appropriate summary. Include a list of sources (3 or more) which attendees could refer to if they wish to fact check your work. second order Your Task: Develop an ″intake″ briefing for a group of software engineers who have been tasked with developing a standard set of security review processes for virtual teams. The purpose of these processes is to ensure that compliance for software security requirements is verified resulting in software applications and software-based products where security is ″built in.″ The company also intends that these processes be used towards the organization′s achievement of Capability Maturity Model Integration (CMMI) Level 3 — Defined. Background: Software development is a complex task, especially as technology changes at the speed of light, environments evolve, and more expectations are placed upon vendors who want to be competitive within the software market. Many software development organizations also depend upon virtual teams whose members are geographically dispersed. This complexity also makes implementing and testing security features (for software applications) much more challenging. Format: This week, the format for your deliverable (posting) will be ″Talking Points.″ Talking points are presented in outline format and contain the content that you would put on slides in a slide deck. Your outline should include 5 to 7 major points (″slide titles″) followed by 3 to 5 supporting points for each. Remember to put enough information into the talking points that your peer reviewers can understand what you intend to cover in each section of your briefing. Remember to introduce the topic at the beginning, present your analysis, and then close your briefing with an appropriate summary. Include a list of sources (3 or more) which attendees could refer to if they wish to fact check your work.

Let Us write for you! We offer custom paper writing services Order Now.

REVIEWS


Criminology Order #: 564575

“ This is exactly what I needed . Thank you so much.”

Joanna David.


Communications and Media Order #: 564566
"Great job, completed quicker than expected. Thank you very much!"

Peggy Smith.

Art Order #: 563708
Thanks a million to the great team.

Harrison James.


"Very efficient definitely recommend this site for help getting your assignments to help"

Hannah Seven