Need help
Module 4 – Case
Managing and Assessing Information Security Policy
Assignment Overview
The Information Security Blueprint is the basis for the design, selection, and implementation of all security program elements. The blueprint builds on top of the organization’s information security policies and it is a scalable, upgradable, comprehensive plan to meet the organization’s current and future information security needs. The blueprint is a detailed version of the information security framework, which is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization. Security education and training is an important part of the Information Security Blueprint.
Case Assignment
Search the Web for security education and training programs in your area. Keep a list and categorize the types of training offered. Determine the costs associated with each. Is the training general or for a specific security certification? Assess the cost effectiveness of the training both in terms of both time and money.
Assignment Expectations
Describe your results. Put them in a table describing the training program and cost. You will assess the programs in terms of time, money, and effectiveness. Summarize with a discussion of the key characteristics for Web security and training programs.
You are required to make effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Please use the
Trident APA 7 Guide
at proper formatting and style.
Module 4 – Resources
Managing and Assessing Information Security Policy
Required Reading
Blum, D. (2021). Rational Cybersecurity for Business: The Security Leaders’ Guide to Business Alignment, Apress. Chapter 5-9.
Finding Skillsoft Books
(2022) Cybersecurity 101: Auditing & Incident Response. Course. 1st half of course.
Finding Skillsoft Books
(2022). Cybersecurity Awareness: Getting Started with Security Foundations. 1st half of course.
Finding Skillsoft Books
De Freminville, Marie (2020). Cybersecurity and Decision Makers: Data Security and Digital Trust, Wiley Chapter 3,4,5, and 6.
Finding Skillsoft Books
Smallwood, R. F. (2020). Information Governance: Concepts, Strategies and Best Practices, Second Edition. Wiley-VCH. Chapters 1 – 5.
Finding Skillsoft Books
Optional Reading
Gregory, P. H. (07/24/2019). CISM® : Certified information security manager practice exams McGraw-Hill. Chapter 4