Instructions In IT security risk assessment, risk analysis is significant in hel

In IT security risk assessment, risk analysis is significant in helping the cybersecurity analyst determine the controls needed to mitigate the vulnerabilities, threats, and risks detected. In evaluating the IT-related business processes applied by an organization, understanding the relationship between risk and control is significant to the cybersecurity professional. The cybersecurity professional should be able to relate the application of different information security concepts to the role of a cybersecurity professional.
For this assignment, develop a presentation with speaker notes in which you communicate to executive management and stakeholders the importance of implementing a risk-management strategy as part of the corporate security program. Provide the following:
Title (1 slide)
Agenda (1 slide)
Introduction (1 slide)
Define the importance and value of corporate data and the cost of ownership, and functional and technical requirements (1 slide)
Discuss the process of risk assessment or analysis (1 slide)
Identify and classify IT assets
Identify the likelihood of the vulnerability and impact
Identify risks to manage and its possible approaches (avoid, share or transfer, mitigate, accept risk)
Risk-management strategies and countermeasures (1 slide)
Develop a risk matrix describing the possible occurrence of events or incidents similar to the assessment’s findings, their level of severity and impact, and their categories (likelihood of occurrence). Discuss each of these vectors of the matrix at the speakers note section.
Performance measurement and evaluation – Risk-management log (1 slide)
You will design a risk register into which you will insert these findings and classify them based on the risk matrix and recommendations for mitigation and control. Insert the register in a slide and discuss in detail the risk of theft or exposure to personal identifiable information (PII) when paper documents and electronic files are not properly disposed of (shredded, removed) at the speaker notes section.
Manage network and connectivity issues as part of the risk-management strategy (1 slide)
Manage sensitive documents, errors, and exceptions (1 slide)
Summary and conclusion (1 slide)
In the presentation, define each topic’s role in information security. In the speaker’s notes, discuss in a vivid and succinct manner how the information security role relates the role of a cybersecurity professional or can help a cybersecurity professional accomplishes related tasks. Based on the speaker notes, you will make a recording to accompany the presentation using the VideoNote feature.
Listed below are some tips for your slide presentation and recording.
Begin your presentation with a title slide that includes your name. (Do not include the NCU coversheet for your PowerPoint presentation).
Use plenty of white space on the slides.
Provide a few appropriate graphics to balance and support the narrative. Make sure the illustrations are in line with the bullets presented in the slide.
Use six or fewer bullets per slide.
Use Times New Roman, 28- or 32-point font.
Use the speaker’s notes area to include the information you want to share with your audience. The speaker’s notes must be coordinated with the information on the slides. Be sure to provide citations for your sources. Speaker’s Notes Length: 100-150 words for each slide.
Make sure the recording is aligned with the speaker notes.
Be creative. You can add audio other than the voiceover to the presentation if you choose to do so; however, it is not required.
Include references on your final slide(s).
Length: 6 to 8 slide presentation with speaker notes of no fewer than 100 words per content slide, not counting the cover, agenda, and references. Follow the outline presented above. The recording must follow the sequence from the speaker notes.
Support your presentation with a minimum of five recent (within the past five years) scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.
Your presentation should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral University’s Academic Integrity Policy.

This entry was posted in Other / Recommend Risk Reduction and Mitigation Techniques for Threat Monitoring. Bookmark the permalink.

Leave a Reply

Your email address will not be published.