Benchmark – Security Program Roadmap Presentation-ITT 430

Benchmark – Security Program Roadmap Presentation-ITT 430

Benchmark – Security Program Roadmap Presentation

Assessment Description

The next step in a security policy is to evaluate the various laws, compliance standards, secure configurations, and policies organizations. These must be applied to meet business needs and customer expectations, achieving trust and competitive advantage.

Evaluate the System Security Policy created in Topic 3 and expand it to an appropriate security program for your company to communicate a roadmap to leadership. Also, refer to the “Security Program Roadmap Timeline Example.”

Create a 3-5-minute video presentation for upper management and include the following:

  1. An executive summary that provides the purpose and justification for the elements presented (consider recent events, lack of awareness, loss of finances, reduced competitive advantage, proactive vs. reactive, etc.).
  2. A brief discussion of technological literacy skills necessary to design components of information systems solutions.
  3. A roadmap design that includes the goals and objectives for implementing a security program within an organization.
  4. The maintenance needed to ensure effective and efficient information technology (IT) system performance and security by measuring the effectiveness of a security program.
  5. The application of best practices and frameworks to integrate tools and technologies required to support an organization’s security program.
  6. The fundamental security design principles in play, how they interrelate, and methods in which they should be applied to develop systems worthy of trust.
  7. An analysis of the common security failures and the specific design principles that have been violated.
  8. The description of the steps to take to monitor and control the structure of the security program.

Show professionalism in your speech and appearance.

Use an online video platform such as Loom, YouTube, or Vimeo to upload your completed video. Add the link to your video to a Microsoft Word document and ensure that others can access and view your linked video prior to submitting it to the digital classroom.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

Benchmark Information

This benchmark assignment assesses the following programmatic competencies:

BS Information Technology and BS Information Technology – Cybersecurity

1.1: Demonstrate technological literacy skills necessary to design components of information systems solutions.

BS Cybersecurity

5.3: Perform maintenance necessary to ensure effective and efficient information technology (IT) system performance and security.

7.3: Analyze common security failures and identify specific design principles that have been violated.

Attachments

Answer Preview-Benchmark – Security Program Roadmap Presentation

 

$10.00

Posted

in

by