Chief Security Officer for Crypto.com Arena
MEMORANDUM
To: [Insert name of your venue’s chief security officer]
From: [Insert your name]
Re: [Insert subject of your memorandum]
Date: [Insert date you deliver memo to Professor Jaconi]
I. Introduction
[Describe the assignment, “You requested that I identify…and…]
II. Historical Risk Event
[Describe the historical risk event]
a.
Impact
[Describe the possible impact of such an event occurring at your venue.]
b.
Likelihood
[Describe the possible likelihood of such an event occurring at your venue.]
III. Recommended Controls
[Describe any controls that could be implemented for the risk event you identified.]
IV. Recommended Financing Mechanisms
[Describe any financing mechanism (e.g., insurance) that could be implemented for the risk event you identified.]
V. Control and Financing Implementation Plan
[Describe a plan to implement the controls and financing mechanisms you recommended to the chief security officer and the parties responsible, start dates, and end dates for implementing those controls. You may choose to use a table, such as that below to provide the details on parties responsible, start dates, and end dates.]
Task |
Responsible Party |
Start Date |
End Date |
Notes |
[Describe briefly control or financing mechanism to be implemented; there needs to be enough detail to understand the task] |
||||
VI. Conclusion
[Provide a brief summary of the purpose of the memorandum and the contents and offer to answer any questions.]
Artificial Intelligence Usage
[In accordance with the Artificial Intelligence (AI) Usage Policy set forth in the course syllabus, all students must include a paragraph at the end of any assignment disclosing whether students used AI or not. If students did use AI, students must explain how (and why) students used AI and indicate/specify the prompts students used to obtain the results. Failure to do so is a violation of academic integrity policies.]
2