CMGT 433 Week 5 Individual: Cyber Security Awareness for Executives and Managers

0 items
CMGT 433 Week 5 Individual: Cyber Security Awareness for Executives and Managers
CMGT 433 Week 5 Individual: Cyber Security Awareness for Executives and Managers
$10.00
  • Description

CMGT 433 Week 5 Individual: Cyber Security Awareness for Executives and Managers

The company you chose in Week One will hold a national convention of all of the U.S.-based executive staff members across 15 locations. The CIO has chosen “Cyber Security Awareness” as the theme for the convention. Based on the quality of your previous training presentations, you have been chosen to write and deliver a presentation at one of the Executive Round Table Meetings during the convention. The CIO has stressed creating a presentation that will capture the attention of executive management.

Create a 15- to 20-slide PowerPoint® presentation, including speaker’s notes. Use graphics, animation, or charts as appropriate.

Create a 1-page executive summary that the executives can use to communicate the highlights of the presentation within their organizations.

Include the following topics in the presentation. Avoid using research quotes or acronyms. Combine and/or order the topics in the way you believe to be most effective:

  • What is network protection? What needs protecting?
  • What is a Cyber Attack? How can cyber security help?
  • Security and ROI
  • Legislation and government influence
  • Ethical and legal issues
  • The Six Principles of Information Security Management.
  • What challenges are there with cloud computing?
  • Why is the Internet often considered the cause of cyber security issues?
  • The role of the workforce in security
  • Training, awareness, motivation, and continuous improvement
  • Disaster recovery and business continuity
  • Why are contingency planning and vulnerability management important?
  • Security Audits – What are they? Who uses and performs them?
  • Risk Management in reducing the probability of a negative event
  • Social Engineering – What is it? How might we be vulnerable to it?
  • Backups (full, copy, incremental, differential)
  • Deterring network attacks
  • Roles of our employees in cyber security

Compile all files into a ZIP folder.

Submit your ZIP folder using the Assignment Files tab above.