Managing and Assessing Information Security Policy
The Information Security Blueprint is the basis for the design, selection, and implementation of all security program elements. The blueprint builds on top of the organization’s information security policies and it is a scalable, upgradable, comprehensive plan to meet the organization’s current and future information security needs. The blueprint is a detailed version of the information security framework, which is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization. Security education and training is an important part of the Information Security Blueprint.
Module 4 Video
Case Assignment
Search the Web for security education and training programs in your area. Keep a list and categorize the types of training offered. Determine the costs associated with each. Is the training general or for a specific security certification? Assess the cost effectiveness of the training both in terms of both time and money.
Assignment Expectations
Describe your results. Put them in a table describing the training program and cost. You will assess the programs in terms of time, money, and effectiveness. Summarize with a discussion of the key characteristics for Web security and training programs.
You are required to make effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Please use the Trident APA 7 Guide at https://careered.libguides.com/tui/library/apa for proper formatting and style.
Module 4 – Resources
Managing and Assessing Information Security Policy
Required Reading
Blum, D. (2021). Rational Cybersecurity for Business: The Security Leaders’ Guide to Business Alignment, Apress. Chapter 5-9. Finding Skillsoft Books
(2022) Cybersecurity 101: Auditing & Incident Response. Course. 1st half of course. Finding Skillsoft Books
(2022). Cybersecurity Awareness: Getting Started with Security Foundations. 1st half of course. Finding Skillsoft Books
De Freminville, Marie (2020). Cybersecurity and Decision Makers: Data Security and Digital Trust, Wiley Chapter 3,4,5, and 6. Finding Skillsoft Books
Smallwood, R. F. (2020). Information Governance: Concepts, Strategies and Best Practices, Second Edition. Wiley-VCH. Chapters 1 – 5. Finding Skillsoft Books
Optional Reading
Gregory, P. H. (07/24/2019). CISM® : Certified information security manager practice exams McGraw-Hill. Chapter 4
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
![](https://collepals.com/wp-content/plugins/posts-import/files/order-now-with-paypal.png)