Respond to these colleagues (BELOW): (Half a page each and please, provide each references)
Absent fully qualified candidates for cybersecurity positions, explain the steps taken to ensure the requirements of the job are still accomplished. Provide rationale for each step.
Post from colleague 1
The role an IT analyst or security admin for a corporation is invaluable. And given the necessity for such position, their potential absence will carry the risk of leaving the network more vulnerable. In the instance that a manager or team lead needs an extended leave of absence, an interim manager could possibly be acquired. With this particular scenario, the interviewer should understand the absent managers current responsibilities, skillset, and most importantly, pending project that affect business needs, in order to select an optimal interim manager. There is a listing for an interim CISO position off of Cyberexecs Recruitment page, in which the contract only extends for 3 months (2020). It would be important to adequately incentivize the interviewer, as a 3-month contract may exclude capable applicants. In addition, this would be a fair route to take, only in the instance that another team lead or senior analyst could fill the responsibilities of the absent manager. In my own organization, the role-out of a new customer relationship management system was underway. In the midst of its implementation, the project lead had to suddenly leave the role, which led to complications in the role out. The end result was a system update that required an addition 4 – 5 months of configuration for the new CRM to be usable. It’s my opinion that this is beyond suggestive as to the importance of key players in IT for longstanding projects to become fully realized.
Cyberexecs (2020) Cybersecurity recruitment roles. Retrieved from https://www.cyberexecs.net/cyber-security
Post from colleague 2
Good afternoon Professor and classmates,
The lack of qualified candidates working for the company itself doesn’t mean that the company has to be put fully at the risk of attacks on its networks and systems. There are some basic options available and many can work for smaller businesses that may not have the capital available to hire a full-time team of IT professionals. The first of which is keeping hardware fully updated with the latest settings, and that is something that even a basic user can usually do on their own. This includes settings such as restricting ports or setting up an additional firewall, many of these options can be googled to setup by basic users.
Another option is to hire an outside company that can work out a sort of payment plan for smaller companies that will be able to set up a system and it’s security that may work for those who don’t need the fully dedicated team.
Sobers, R. (2020, June 17). In 52 Key Cybersecurity Tips: Your Playbook for Unrivaled Security. Retrieved from https://www.varonis.com/blog/cybersecurity-tips/
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we\'ll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.