Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

CSIA 485

CSIA 485: Practical Applications in Cybersecurity Management & Policy

Project #3: Presentation for Board of Directors

Your Task:

Padgett-Beale’s Chief Information Security Officer (CISO) has tasked you to continue supporting the Merger & Acquisition team’s efforts to bring Island Banking Services’ security program into compliance with U.S. laws and regulations. The M&A team has provisionally accepted the draft cybersecurity strategy and draft implementation plan which you prepared previously. The M&A team has now requested that you contribute a set of summary slides for the M&A team’s Decision Briefing (presentation) to the Padgett-Beale Board of Directors. This briefing is one of the final steps in obtaining approval for the M&A team’s plan for integrating the newly purchased company – Island Banking Services – into Padgett-Beale as Padgett-Beale, Inc Financial Services (PBI-FS).

Before you begin developing your presentation, review your work products from Projects 1 & 2. As you do so, identify the most likely or most significant barriers to success (factors which increase the risk of failure). These can include barriers arising from external factors as well as issues arising from internal company sources. Consider culture and organizational conflict as well as legal and regulatory issues. For each factor, identify a countermeasure or compensatory action which the company could take to reduce the risk of failure. Select the five most significant barriers to success from your analysis. You will include these in your presentation slides.

Develop Your Presentation:

Using your prior work (Projects 1 & 2), develop a high-level summary presentation of your Cybersecurity Strategy and the Implementation Plan. You will need between 20-30 slides to fully address the requirements listed below; this slide count includes the slides for titles, section titles, and references. Remember to include speaker notes for the agenda slide, section title slides, and content slides. Your notes should be at least 20 words / one paragraph but no longer than 150 words / 3 paragraphs per slide.

Your presentation must include the following:

· Title Slide with title, your name, the date, and this course

· Agenda Slide

· Overview of the M&A effort (multiple slides – use the assignment overviews / background sections to put together a summary that answers: who, what, where, why, how)

· Section Title Slide: Cybersecurity Strategy

· Content Slides: provide a summary of your proposed Cybersecurity Strategy (Project 1)

· Section Title Slide: Cybersecurity Implementation Plan

· Content Slides: provide a summary of your proposed Cybersecurity Implementation Plan

· Section Title Slide: Barriers to Success

· Content Slides: five separate slides – one for each factor (identify each barrier to success and provide a recommended countermeasure or compensating action that the company could implement to reduce the risk of failure). This section will expand upon your “barriers to success” as discussed in Project #2.

· Section Title Slide: Summary & Recommendations

· Content Slide: present a recommendation that the strategy & implementation plan be approved by the Board of Directors for adoption and implementation by the company. Include 5 major business benefits of adoption and implementation. This may be new content (not previously included in projects 1 & 2).

· Section Title Slide: References

· Content Slides(s) that include reference list entries for your resources. Do not cite your own work for Projects 1 & 2.

Putting It All Together

MS Power Point .pptx format is the preferred delivery format; this application can be accessed via the Web or downloaded from UMGC under the university’s enterprise license for student use of Office 365. For more information see:

If you are unable to use Power Point, you may use another presentation application to create your slides and speaker notes. After you have done so, print your presentation slides to PDF and deliver the assignment as a PDF document. If you deliver as PDF, you must make sure that your speaker notes are visible and accompany each slide.

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your presentation should be professional in appearance with consistent use of fonts, font sizes, margins, etc.

3. You must include a title slide with the assignment title, your name, and the due date. Your reference list must be on a separate slide at the end of your file.

4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). To reduce visual clutter, you may put citations for sources into footnotes at the bottom of your slides (instead of putting citations at the ends of bullet points).

Copyright © 2022 by University of Maryland Global Campus. All rights reserved.

image1.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

CSIA 310 wk2 discussion

  Write a short “newsletter” article (3 to 5 paragraphs) for the non-technical managers and employees at Sifers-Grayson to explain the following: (a) What is Phishing? (Focus on phishing emails and targeted attacks that include spear phishing and whaling.) (b) What “bad things” can happen when a successful phishing attack

Project 3

To complete this assignment, review the prompt and grading rubric in the Project Three Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.

digital marketing

 Digital marketing involves promoting products and services using online platforms.The goal is to increase brand awareness and drive sales 

WEEK 2 DISCUSSION MR

 I UPLOADED IN THE FILE HOW THE ASSIGNMENT SHOULD FLOW AND ALSO THE ACCEPTABLE TOPICS FOR MY PROGRAM THAT U CAN SELECT FROM!  INSTRUCTIONS!! This week you considered study topics deemed acceptable for your program. For this discussion, share with your peers your initial thoughts on a topic you’d like

wk 2 practice models

INSTRUCTIONS!! Discuss the various practice models discussed in Chapter 3 of The Ernst and Young Business Plan GuideLinks to an external site.. What model is the most attractive for your own consultancy? Why? Do you see the model for your practice changing in the future?   READ CHAPTER 3!! OF THE

Computer Science Sustainable Development Goal and Mobile App Assignment

ATTACHED IS THE COPIED STATEMENT ON INTEGRATION OF FAITH AND WORK A s a university, we believe that the message of Jesus Christ bears profound implications, not only for individuals, but also for society and the ways that we as individuals live within it. The Lord Jesus instructed His followers

Intro Pogramming

After viewing the videos and listening to the information on programming, you should be ready to answer the questions listed below.     Your assignment is as follows:  I.   Access the Youtube videos:    Introduction to Programming Fundamentals (by Neso Academy).  You will be responsible for accessing the first 3 videos in

Disruptive technology and its impact on society (Discussion)

A discussion on disruptive technology and its impact on society 1) Discussion 1: Write a reflective response to the lesson on disruptive technology and its impact on society. (200-word minimum) Explore the impact on a macro and micro level looking at the impact on systems and structures as well as the

week 1 begin your

 I am a Kroger fulfillment delivery driver trainer / and I am also a TECH SUPERVISOR for spectrum whichever job you find easier to discuss about share something from your profession, job, or other source of inspiration that generated the idea for your project. What do you want to learn

project 2

To complete this assignment, review the prompt and grading rubric in the Project Two Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback. For reference, refer to the CIA Triad and Fundamental Security Design Principles PDF document.

project 1

To complete this assignment, review the prompt and grading rubric in the Project One Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.

Final SWOT presentation

Concepts and Applications of Information Technology (IFSM201) Class Project Purpose of this Assignment The Class Project is the most significant assignment in this course, Concepts and Applications of Information Technology. As such, it accounts for 58% of the course points. This assignment is comprised of two deliverables: a SWOT Analysis

Wk4_411

Need help with a question. Due 10/7/2024 Based on your research, readings, and this week’s Learning Team assignment, create a 4- to 5-page sample penetration agreement for a banking institution using the major sections listed below and the purpose of each section. Include examples within each section. The major sections

Discussion 7 Social Networking

  Discussion Seven – Social Networking Social networking Web sites create online communities of Internet users that eliminate barriers created by time, distance, and cultural differences. These sites allow people to interact with others online by sharing opinions, insights, information, interests, and experiences.  Members may use the site to interact

Cap assign

Unit III Scholarly Activity Top of Form Bottom of Form Assignment Content Top of Form Purpose, Subject, Object, and Ethics In this unit, you will determine the purpose, subject, object, and ethical considerations of your case study, then assemble your findings in the  Unit III Case Study Outline Template .

project 3:

Support Queue Case Study Instructions:  Select two tickets from each level and explain how you would solve them. Name:  Level 1 Tickets Instructions:  Select two of the five scenarios to troubleshoot.  One template has been created for each of the two tickets you need to choose.  Make one to two

case

Write three pages of high-quality content for this case study, using the concepts discussed in class and any relevant external resources to support your analysis. Follow the instructions for your research problem carefully, as your argument and research will significantly impact your grade. Ensure that AI patterns do not exceed