Need help with a questionWeek 1 – Due ASAPATTENTION: Microsoft Project is RECOMMENDED for this task. Microsoft Project may be

Need help with a question

Week 1 – Due ASAP

ATTENTION: Microsoft Project is RECOMMENDED for this task. Microsoft Project may be downloaded for free from the University (not available for MacBooks). The instructions for downloading MS Project may be found under “Course Resources” and “Student Success Guide”. If you have problems with the instructions, contact Technical Support for assistance. Alternatively, the assignment may be completed using Microsoft Excel by creating the GANTT chart in a worksheet (required for MacBook users).

Attention: Before beginning work on this assignment, read/review the following Announcements:

·
Instructor Late Assignment Policy

·
Submitting Individual Assignments

·

Plagiarism – Don’t Do It!!

In our readings, the CISO is described as “a program manager who leads activities related to a collection of projects, operations, and activities managed as a group.” One of the activities involved with this is creating and managing a security portfolio.

Part 1

Develop a 1- to 2-page matrix using the 
Wk 1 Assignment Template that identifies 5-7 key components in creating a security portfolio.

Part 2

One of the tools you will use in project management is Microsoft® Project. As a CISO, you may not be the person who actively creates the project in Microsoft® Project, but you will need to be aware of what this tool is used for in planning projects with regard to time, resources, and budget constraints.

Read the following scenario:

The CISO manages a portfolio for a company that operates in the emergency response sector. One of the projects in the portfolio is the establishment of an emergency response center starting from a single cold site so as to eventually establish a 30-station network.

Using the Gantt chart view in Microsoft® Project, 
create a task list/work breakdown structure. Create one task “Stand up Cold Site.” All other tasks are subtasks under this one. Using Project—Project Information, input the Start date as today’s date for the Project (do not input any other dates for any tasks). Under this task, create subtasks with logical dependencies for the following:

· Obtain physical site

· Coordinate installation of power, communications, and temperature control

· Install office furniture

·:

· Do NOT enter durations, estimated times, constraints, due dates, etc.

· Input only human resources. Use made-up personnel names and use names of departments or groups where it is reasonable (e.g., information system group, power installation group, system software installation group, security group, etc.).

· Assign them to tasks.

· Be sure to assign people to all tasks.

· Do not worry about people who are over-assigned.

· Do not assign percent of units, costs, hourly wages, etc.

Submit your assignment as a Microsoft® Project file or Microsoft® Excel file.

Week 2 – Due ASAP

Assignment Content

1.

Top of Form

Attention: Before beginning work on this assignment, read/review the following Announcements:

·
Instructor Late Assignment Policy

·
Submitting Individual Assignments

·

Plagiarism – Don’t Do It!!

Part 1

You are a newly hired CISO for the largest student loan company in the United States. Recently, the company launched a new online lending self-service platform targeted at working adults worldwide.

The new platform replaces an out-of-date lending system based on emails for processing loan applications. The online platform will be hosted in a multi-tenant data center and managed by outsourced IT staff. However, the security will be monitored by your internal security team. 

Recently, the project has been delayed because of unanswered security concerns about how the company will protect the financial information of job applicants and future students. Your boss has asked you to provide project management to get things get back on track.

Soon after joining the project team, you are asked by the board of directors to illustrate an information security program development model that will be used to secure the new online platform and to provide a project plan for future security assessment activities to measure the security effectiveness of the online platform. They also would like to know how you will categorize resource planning for security monitoring of the online platform so they can make a more informed decision on how best to invest into areas of the company to improve overall security.

Create a 16-slide Microsoft® PowerPoint® media-rich presentation that includes an introduction slide, conclusion slides , and references slides for the board of directors. Your presentation should:

· Outline project management.

· Describe how to use
 3 key areas of an information security program development model of your choice.

· Categorize
 resource planning for security monitoring of the online platform.

· Identify the categories of resource planning, and illustrate how stakeholders, personnel, and technology will be used.

Include all of the required information on the main slides. Speaker Notes 
ARE NOT graded.

 

Part 2

Using the 
Wk 2 Assignment Template,
 create a 1- to 2-page Security Assessment Plan worksheet for two activities. Explain how these activities will measure security effectiveness. In the space below the table, describe how you would implement this plan in Microsoft Project.

 

References and a “Cover Sheet” with your name on it are required for all assignments.

Submit your assignment.

Week 3 – Due 4/7/2024

Assignment Content

1.

Top of Form

Attention: Before beginning work on this assignment, read/review the following Announcements:

·
Instructor Late Assignment Policy

·
Submitting Individual Assignments

·

Plagiarism – Don’t Do It!!

Scenario: You have just successfully implemented an online platform at your company. The system has been in production for 6 months processing student loan applications and accepting credit card payments for books and course fees. 

The IT director has been asked by the board of directors (BOD) to build a network operations center (NOC) to provide 24/7 support to customers and internal staff. The IT director begins assembling the team who will design and implement a NOC and asks you to lead the development of a security operations center (SOC) to handle security incidents that the organization may encounter. Since the internal security team already monitors security for the online loan processing platform, it’s expected that developing a SOC is the next logistical step in maturing the security of the organization. 

You are asked by the IT director to 
create a project charter and include a project scoping statement for the SOC project with a primary focus on how the SOC will comply with the various industry and government information security regulations. The IT director also points out that you need to outline how you plan to manage scheduling, cost, teams, and the quality of the project. 

Part 1

Using
 the 
Wk 3 Assignment Template
complete a 2- to 3-page project charter. Develop a clear and understandable project scoping statement as it relates to the scenario.

Part 2

Write a 2- to 3-page plan in which you:

· Describe
 the purpose of a project charter.

· Outline how the triple constraints can affect a project.

· Identify at least 3 model project management phases and describe the purpose of each phase.

· Select one approach to manage scheduling, cost, teams, and quality of a project specifying the use of Microsoft Project or another tool.

· Propose how you plan to resolve personnel and teamwork issues as they arise.

References and a “Cover Sheet” with your name on it are required for all assignments.

Format your assignment according to APA guidelines.  

Submit your assignment.

Bottom of Form

Week 4 – Due 4/14/2024

Assignment Content

1.

Top of Form

Attention: Before beginning work on this assignment, read/review the following Announcements:

·
Instructor Late Assignment Policy

·
Submitting Individual Assignments

·

Plagiarism – Don’t Do It!!

Scenario: As the CISO, you have overseen the security operations center (SOC) implementation and your team has successfully handled a variety of security incidents. The buzz around the company is that the new SOC is friendly and quick to solve incoming requests. However, the NOC implementation has slowed because of project delays and concerns about budget overrun. 

One afternoon the chief financial officer (CFO) turned on her computer and opened an email from someone she knew. After she clicked a suspicious web link, the computer screen suddenly went dark then green text began to fill up the screen saying the computer files had been encrypted. The CFO called the help desk, and the SOC responded immediately. 

You later learned that your CFO was attacked by a new ransomware attack named Petya. The next morning the CFO called you into her office to explain that the board of directors has called an emergency meeting for next week to discuss the impact of the cyberattack and to learn more about how the NOC and SOC are designed to protect the company and its customers from security incidents like ransomware. She has asked you to prepare for a meeting with the board.

Part 1

Develop a 14- to 16-slide Microsoft® PowerPoint® presentation in which you:

· Illustrate the information security portfolio hierarchy and the SOC functions that support the company’s overall security program. The illustration should include at least three SOC functions.

· Describe how security operations processes, policies, and procedures are integrated into SOC functions.

· Explain how you will assess the security effectiveness of the SOC.

· Describe how your approach could mitigate incidents like the Petya attack.

· Illustrate the conflicting roles of security operations personnel in reporting audit findings, and offer a logical prediction of how the SOC plans to address these concerns given your current perspective.

 

 All relevant and required information must be on the main slide. 
Presenter Notes are not Graded.

Part 2

Write a 2- to 3-page handout for the meeting with the board of directors in which you:

· Outline computer security incident response.

· Explain
 the purpose of a security operations center and its staffing.

·.

· Explain the possibility of conflicting roles of security operations personnel in reporting audit findings to raise awareness to senior management.

Format any references according to APA guidelines.

Note: Images should not be copied unless author permission is obtained or copyright-free images are used. 

 

References and a “Cover Sheet” with your name on it are required for all assignments.

Submit your assignment.

Bottom of Form

Week 5 – Due 4/21/2024

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Discussion: TQM Planning Your consulting company is being considered for

Discussion: TQM Planning Your consulting company is being considered for a subcontract to manage a project because of your firm’s excellent human resource and quality management skills. However, you find that you must first convince the contracting company that your company is more capable in applying Total Quality Management (TQM)

Provide a brief overview of the company and their primary

   Provide a brief overview of the company and their primary business- (e.g. Lowes is in the home improvement business, operates in XX states and XX countries worldwide and is headquartered in YY city established in 19XX.) Discuss the overall company size (sales & employees), location (sales & employees), operating

Scenario: A 78, year-old man is a retired banker whose

Scenario:A 78, year-old man is a retired banker whose wife died several years ago. He is able to perform all ADLs but needs help with meal preparation and transportation. He lives in a deteriorating neighborhood and no longer feels safe. He does not want to live with family members or

Write a 2 to 3 page long summary and review

Write a 2 to 3 page long summary and review per each article. Article Review should include a summary of the article’s core contents, arguments, conclusions AND your own critical assessment & comment based on your own research on the topic. For example, new developments (technologies, theories) on the topic

each question needs to be 150-200 words with 1-2 references

each question needs to be 150-200 words with 1-2 references 1)sporting events of all sizes will have an economic impact on  communities, specifically those located near the event site. Using your  own experience discuss the impact event travel and sports tourism can  have on communities. As a member of the

Topic #1 – Impactful Practices in Training Consider a training

Topic #1 – Impactful Practices in Training Consider a training course you have taken in the last several years.  Which aspects of the training did you find had the most impact (e.g., participant guide or other handouts, the learning activities, any pre/post work)? Why did you find these useful? Topic

Utilizing tools such as Google Scholar and Scirus identify published

Utilizing tools such as Google Scholar and Scirus identify published material that describes research and methodologies (3 different strategies) that can be utilized by team members to automatically adjourn the project’s status; Describe these solutions; Discuss the applicability of these solutions to IT projects; Discuss how the role of the

When you hear the word “cap” what are the first

When you hear the word “cap” what are the first 5 words that come to mind? Feel free to add explanations or rationalizations, if deemed necessary. Please generate your own list before looking at anyone else’s; this will help you see how individual experiences can influence conceptual connections. 100 words

Develop critical insights about the impact of poverty on

The goal of this assignment is to develop critical insights about the impact of poverty on child/adolescent development considering the varied biological, psychological, social, cultural, and spiritual factors that separately and together influence human adaptation. Another goal is to enhance the ability of students to utilize a strength-based conceptual framework