Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In the discussion, A Deeper Look at Security Organizations, you closely examined the various departments, functions, and associated activities that make up a typical cybersecurity

In the discussion, A Deeper Look at Security Organizations, you closely examined the various departments, functions, and associated activities that make up a typical cybersecurity organization. Using that knowledge, you will now have the opportunity to build your own cybersecurity organization.
The chance to build a cybersecurity organization from scratch is a unique opportunity that most people in the field do not get to experience in their careers. While it may seem overwhelming at the onset, the excitement in seeing how your creativity, strategy, and preparedness results in an adequate, collaborative, and agile organization that protects and defends the business from a cyber-attack is rewarding.
Here are the instructions for this assignment:
Using your knowledge from the A Deeper Look at Security Organizations discussion, create a fictitious organization for which you would like to build a cybersecurity organization. Your fictional organization can be in any sector of the economy.
Explain your organization's business, the current state of their cybersecurity, and any security concerns or goals.
To get you started, here are some sector ideas:
Aerospace, aviation, automotive, biotech, construction, education, energy, entertainment, food, healthcare, manufacturing, medical, non-profit, oil, pharmaceuticals, retail, technology.
Describe your team. As you have learned in this module, a good cybersecurity organization comprises many cross-functional teams responsible for the daily security operations, managing IT assets, assessing threats and vulnerabilities, managing risks, establishing policies, setting up procedures, and providing training.
Describe the departments and functions of your cybersecurity organization.
Explain your reasoning and how it supports your fictional organization's business and security concerns or goals.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MySQL/PHP Database Applications

Authors: Brad Bulger, Jay Greenspan, David Wall

2nd Edition

0764549634, 9780764549632

More Books

Students also viewed these Databases questions

Question

What is one of the skills required for independent learning?Explain

Answered: 1 week ago