MDM Policy Presentation
Mobile Device Management Policy Transcript
As the chief information security officer for one of the largest global financial institutions, you are part of the company’s weekly executive meetings. This week, the CEO starts the discussion with a statement:
“I am constantly impressed with the stuff I can do on my cell phone and tablet. It’s amazing!…I am completely connected to all aspects of the business, as well as the outside world.”
After a brief pause, he continues:
“And that’s what causes me concern. Some of the questions that occur to me are:
Where are these devices made?
What do we know about the security of these devices?
Are we confident that our information is protected when we can so easily connect to the company’s information?
“Why, just the other day on my flight, I read a magazine story about a computer chip that is intentionally built to spy on users.
Well, how do we know this chip isn’t in any devices that our employees use? Do we have a specific policy in place on access? Well, if not, we need to develop one, fast.”
You realize that the CEO’s concerns extend beyond the possible issues with mobile technologies so you make the note to update policies on incident management & emerging technologies.
Then, while the idea is fresh on your mind, you start to outline the scope of work.
As the CEO asks for input at the close of the meeting, you propose a series of four projects for your team:
An updated Mobile Device Management Policy to address his immediate concern
An Identity Theft Response Plan to address a “worst-case scenario” event
A Digital Currency Applicability report to address the viability of using blockchain technology and
An Enterprise Cyber Program presentation to the board of directors to explain how your organization addresses cybersecurity issues
The CEO agrees and asks that the you begin with the presentation on the updated Mobile Device Management Policy in the executive meeting scheduled two weeks from today.
As a recent graduate of the UMUC Masters in Cybersecurity program, you have received a well-deserved promotion to chief information security officer (CISO) at the global financial institution where you work. The role is new for you and the company. It reports directly to the chief information officer (CIO), which for the purposes of this course, is the instructor. Much of what you will be doing in the next couple of months is centered around the policy aspects of the bank.
The CIO has lobbied for your role to be created as a result of four concerns that will require your expertise and focus. In general, you are told you will be addressing the following four projects:
Mobile Device Management (MDM)
Identity Theft
Digital Currency
Enterprise Policy
Now that you have an idea of the tasks ahead, the first project will be developing recommendations for mobile device management, which will include written comments and a presentation for the company’s leadership. This is the first of four sequential projects in this course and should be completed in about two weeks. There are 11 steps to complete in Project 1. Contact the CIO (your instructor) with any questions. Proceed to Step 1 to begin.
Since the CEO has agreed for you to update the company’s Mobile Device Management (MDM) Policy, the CIO has requested you first provide a scope of work to determine the level of effort that your team will face. Prepare an overview of the scope of work by posting a brief paragraph (three to five sentences) explaining the approach and deliverable for this project with a few bullet points that address general financial industry concerns with cybersecurity and MDM.
Post the overview to the scope of work discussion for feedback. Afterward, move to the next step, in which you will consider critical infrastructure and how it will affect compliance.
After defining the scope of work, you are ready to begin updating the MDM policy. In order to determine the effectiveness of the current policy, research what critical infrastructure protection concerns affect compliance.
Consider the following list to guide your research:
impact of cyberattacks on critical infrastructure as defined by the Patriot Act of 2001
technologies used in critical infrastructure cyberattacks
cybersecurity defense principles that should be used to counter these cyberattacks
cybersecurity policy framework that should be employed to minimize the opportunity for a successful critical infrastructure cyberattack
Document the findings since they will be used in upcoming steps. In the next step, you will itemize those concerns.
Using notes taken from the completed research in the last step, itemize the findings in a table or spreadsheet titled Crucial Concerns Worksheet that assesses:
The impact of cyberattacks on critical infrastructure as initiated by the Patriot Act of 2001 and later refined by the Department of Homeland Security (DHS).
The technologies used in critical infrastructure cyberattacks. Especially consider which and how technologies may exploit mobile device vulnerabilities.
Cybersecurity defense principles should be used to counter these cyberattacks.
This itemized list of critical infrastructure concerns will be expanded to include an evaluation of cyber-physical systems in the next step so that you can later align critical concerns to MDM policy. It will also be included as an appendix to the updated MDM policy presentation for the board of directors. Submit the Crucial Concerns Worksheet for feedback.
In this phase of the project, you will evaluate cyber-physical systems (CPS) and the Internet of things (IoT) to build upon the critical infrastructure concerns itemized in the previous step. Assuming that you have addressed most of the concerns related to MDM from a policy perspective, begin an itemized list of potential countermeasures. In recognition of on-the-job training, education, and research conducted here, continue to expand the worksheet by specifically addressing issues relating to cyber-physical systems and the Internet of things.
Briefly evaluate cybersecurity hardware, software, and network technological components of cyber-physical systems and the policy issues that they require. Also consider Wi-Fi and Bluetooth technologies and the policy issues they require. Add this evaluation to the Crucial Concerns Worksheet completed in the previous step. This worksheet will be used to align to MDM policy later in the project and will be included as an appendix to the updated MDM policy presentation for the board of directors. Submit the updated table or spreadsheet for feedback.
Now that you have listed crucial concerns surrounding critical infrastructure, cyber-physical systems, and the Internet of things, in this step, you will report on policy impact.
Specifically consider:
the impact, if any, on the critical infrastructure of the company’s mobile device management policies
policy or compliance initiatives that can address these concerns.
a recommended cybersecurity policy framework that when deployed would minimize the opportunity for a successful critical infrastructure cyberattack
Compile your ideas in a report titled Policy Alignment. Create a section in your report titled Policy Impact to document your ideas. This report will also be included as an appendix to the updated MDM policy presentation for the board of directors. You will add to this report in the next step.
Continue to build the Policy Alignment report from the previous step. Now that policy impact has been considered, you will examine policy issues related to cyber-physical systems (CPS) and the Internet of things (IoT).
Create two sections in the Policy Alignment report. The first section will be titled Policy Issues Related to Cyber-Physical Systems. In this section of the report, describe enterprise, national, and international cybersecurity policy issues that arise due to the deployment of cyber-physical systems. In the second section, titled Policy Issues related to IoT, describe enterprise, national, and international cybersecurity policy issues that arise due to the effect of the Internet of things. This report will also be included as an appendix to the updated MDM policy presentation for the board of directors. You will add to this report in the next step.
After documenting policy impact on critical infrastructure and describing policy issues related to cyber-physical systems and the Internet of things in the previous steps, move the focus to current technology developments relevant to mobile device management such as mobile payments and bring your own device (BYOD).
As the CISO of a global financial institution, analyze how such developments affect cybersecurity management and policy at the enterprise, national, and international levels. Also consider relevant technological development topics that may affect policy, such as mobile device privacy concerns. Document your findings in the final section of the Policy Alignment Report. This report will be included as an appendix to the updated MDM policy presentation for the board of directors. Submit the Policy Alignment Report for feedback.
After creating a list of crucial concerns and documenting issues of policy alignment, you are ready to evaluate the current MDM policy. Complete the Evaluating Cyber Policy eLearning Module for guidance on developing a course of action or strategy for updating the current MDM policy for the organization. Document noteworthy concepts, steps, or strategies that will help update the MDM policy in later steps.
In the next step, you will consider any chain of custody impacts to the policy.
After reviewing the process of evaluating cyber policy in the previous step, you are nearly ready to update the MDM policy. Keeping in mind the demands should a breach occur, address two primary aspects of this concern:
mobile device risk reduction (management of mobile device risk) from the employee/consultant perspective
highlighting the portion of your policies that addresses the “chain of custody” requirements if an investigation is required
Document your thoughts to be included in the updated MDM policy framework in the next step.
You are finally ready to update the MDM policy framework. Develop final written comments for presentation at the next standards body meeting. Include any perspectives on evaluation strategy and chain of custody from the previous two steps. These comments should be between two and three pages, and should include a paragraph on your thoughts about how your comments will be received and whether or not they will have an impact on the regulations/standards, etc. Submit the MDM policy framework for feedback. This framework will serve as the basis for your presentation.
The final phase of the project is to deliver a presentation on the MDM findings and policy recommendations to management that summarizes the results. This will include an update to the Policy Framework from the previous step according to received feedback. You are allotted 15 minutes for the presentation.
Refer to the MDM Policy Presentation Instructions for detailed requirements. Submit the MDM Policy Presentation.
MDM Policy Presentation Instructions
Assignment: MDM Policy Presentation
The CEO has entrusted you with delivering a high-level mobile device management policy presentation. The presentation should be about 15 minutes in length. It should highlight how you arrived at your conclusions and why you made these specific recommendations based upon the organizational needs.
Note: This presentation should incorporate key points from the three assignments that you completed in this project. Those assignments should be submitted as documents separate from the presentation. You will submit four files in total.
The presentation to management should include the following elements:
Title Slide
Include:
client (person and/or organization)
title
date prepared
provider (person and/or organization who prepared/is presenting)
Agenda
Overview (introduction and purpose)
Scope of Work (discussion board posting: Step 1)
should include modifications made from feedback received
Crucial MDM Concerns (key points from Assignment 1, Steps 2-4)
Determine the effectiveness of current policies by:
researching the critical infrastructure concerns (include in appendix of presentation) that affect compliance
itemizing findings
evaluating cyber-physical systems
Policy Alignment (key points from Assignment 2, Steps 5-7)
Should include how policy alignment impacts crucial concerns and issues affecting critical infrastructure and cyber-physical systems and consider:
MDM
initiatives that can address concerns
recommendation for framework deployment to minimize opportunities of attacks
potential global effects
ongoing and evolving technological advancements
MDM Policy Framework (key points from Assignment 3, Steps 8-10)
Should include:
action plan to update current MDM policy with strategies, steps, or concepts
potential breach chain of custody to address mobile device risk reduction of individuals and demonstration of policy requirements
When you are finished, submit the 15-minute MDM Policy Presentation, along with the following appendices, which are the assignments you completed during Project 1:
Appendix A: Crucial Concerns Worksheet
Appendix B: Policy Alignment Report
Appendix C: Comments on the MDM Policy Framework
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.