Question
Scenario You have recently been hired by a major organization as a security management professional. Your organization will be hosting a large event, and you
Scenario
You have recently been hired by a major organization as a security management professional. Your organization will be hosting a large event, and you will need to create a security management plan that uses best practices of security management principles and standards. In order to create buy-in for your plan, you will need to create a presentation to present to the chief executive officer that describes the operation and the rationale for your plan in order to minimize vulnerabilities.
Directions
For the first part of your plan, you will need to present the rationale behind why this plan is needed, which security management principles you will be following to help shape your plan, and some of the vulnerabilities your organization might need to mitigate.
- Describe how security management principles will apply to the operation. Consider some of the following:
- Describe any existing event protocols or procedures that you will need to consider. If these exist, how might they impact your plan? If they do not, does an event protocol need to be created?
- Describe who might need to be contacted and why they might need to be contacted for this event. Law enforcement? Local government? Additional security? Other potentially impacted individuals? Who might need to know that this event is happening? Why would they benefit from knowing? What could potentially happen if they were not notified?
- Describe the concerns of the organization. Do they have some key concerns or vulnerabilities that you will need to address in order to ensure you are applying the correct security management principles to this operation?
- Identify best practices of security management for the operation. What are some best practices used in the industry that should be applied to this operation in order to ensure its success?
- Explain vulnerabilities associated with this operation. Address the following in a few words each:
- People: Whom do you need to protect?
- Technology: How will you protect them? Are there particular technologies you could use that will help mitigate these vulnerabilities?
- Processes: Will your people know what to do in various situations? Do you have established systems for dealing with various situations?
For the next part of your plan, you will examine some of the issues that may arise from the implementation of your plan and justify the need for its implementation as well as the benefits of the return on investment to the organization.
- Identify potential issues and problems from principle implementation. What are some of the issues or problems you have identified that your organization may face if this plan is implemented?
- Justify the need for each principle you will be implementing. Consider the following in your justification:
- What is the need? How do you know this principle will resolve the need?
- What open vulnerability are you seeking to resolve? How will this principle seek to resolve this vulnerability?
- Explain a return on investment for the plan. Will your plan bring value to the organization and the people? What is the value it will bring?
Please use in-text citations and references.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started