Design the Enterprise Cybersecurity Program
Order Instructions
Step 14: Design the Enterprise Cybersecurity Program
Based upon all of the reports submitted thus far, as well as feedback received, design the enterprise cybersecurity program. Begin with the enhanced defense framework as a foundation to your cybersecurity program design. Included in the design should be the three program components of simulation, policy, and technology. Finally, the program design should incorporate strategic foresight leadership and strategic alignment to core business functions.
You will include the cybersecurity program design as a section in the final Enterprise Cybersecurity Program Report to the board of directors.
In the next step, you will check the credibility of your resources.
Step 15: Incorporate Credible Support
In order to thoroughly explain why each concept is important, you may need to support your statements with scholarly references. A large part of the final result should be a focus on policies and procedures that should be implemented to leverage the technology, not just depend on the technology to provide maximum cybersecurity defense capabilities. Scan and make note of resources to support your statements in your report. In the next step, you will compile the report.
Step 16: Compile the Enterprise Cybersecurity Program Report
Throughout this project, you have completed all of the pieces critical to an enterprise cybersecurity program. Use the Enterprise Cybersecurity Program Report Instructions to help compile the work into a comprehensive report. This report will document and explain the components of the new cybersecurity program you have designed for the organization. The report will also support your program design. This report will accompany your oral presentation to the board of directors. Use this report in the next several steps to prepare the presentation.
Step 17: Write Presentation Script
Use the Enterprise Cybersecurity Program Report completed in the previous step to prepare your oral presentation to the board of directors. Write the presentation by first outlining the key points to be covered during the presentation.
Remember that there will be nontechnical executives in the audience to whom you will have to sell your program. You will have five to 10 minutes to present your findings, help the executive leaders understand why the program will work, and why it is a good investment for the institution. You will practice and record the presentation in the next step.
Step 18: Record the Presentation
Now that you have written your presentation script, you will need to prepare for the presentation through review and practice. Review your presentation for clarity, making sure the board of directors will understand your proposed cybersecurity program, why it will work, and why it is a good investment for the institution.
Once you are satisfied with the script, practice reading through it two or three times, timing yourself to make sure you are within the five- to 10-minute range. After you are satisfied with your delivery, record the presentation. The type of device that you will use to make your recording will determine how you will record the audio file. Refer to the documentation for your specific device for more information. Once you are ready to move forward, record your oral presentation in MP3 format.
Step 19: Submit the Enterprise Cybersecurity Program Report and Oral Presentation
Congratulations on designing a solid enterprise cybersecurity program for your organization! Submit your Enterprise Cybersecurity Program Report and Oral Presentation files to the CIO.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.