Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

CSIA 485

CSIA 485: Practical Applications in Cybersecurity Management & Policy

Project #3: Presentation for Board of Directors

Your Task:

Padgett-Beale’s Chief Information Security Officer (CISO) has tasked you to continue supporting the Merger & Acquisition team’s efforts to bring Island Banking Services’ security program into compliance with U.S. laws and regulations. The M&A team has provisionally accepted the draft cybersecurity strategy and draft implementation plan which you prepared previously. The M&A team has now requested that you contribute a set of summary slides for the M&A team’s Decision Briefing (presentation) to the Padgett-Beale Board of Directors. This briefing is one of the final steps in obtaining approval for the M&A team’s plan for integrating the newly purchased company – Island Banking Services – into Padgett-Beale as Padgett-Beale, Inc Financial Services (PBI-FS).

Before you begin developing your presentation, review your work products from Projects 1 & 2. As you do so, identify the most likely or most significant barriers to success (factors which increase the risk of failure). These can include barriers arising from external factors as well as issues arising from internal company sources. Consider culture and organizational conflict as well as legal and regulatory issues. For each factor, identify a countermeasure or compensatory action which the company could take to reduce the risk of failure. Select the five most significant barriers to success from your analysis. You will include these in your presentation slides.

Develop Your Presentation:

Using your prior work (Projects 1 & 2), develop a high-level summary presentation of your Cybersecurity Strategy and the Implementation Plan. You will need between 20-30 slides to fully address the requirements listed below; this slide count includes the slides for titles, section titles, and references. Remember to include speaker notes for the agenda slide, section title slides, and content slides. Your notes should be at least 20 words / one paragraph but no longer than 150 words / 3 paragraphs per slide.

Your presentation must include the following:

· Title Slide with title, your name, the date, and this course

· Agenda Slide

· Overview of the M&A effort (multiple slides – use the assignment overviews / background sections to put together a summary that answers: who, what, where, why, how)

· Section Title Slide: Cybersecurity Strategy

· Content Slides: provide a summary of your proposed Cybersecurity Strategy (Project 1)

· Section Title Slide: Cybersecurity Implementation Plan

· Content Slides: provide a summary of your proposed Cybersecurity Implementation Plan

· Section Title Slide: Barriers to Success

· Content Slides: five separate slides – one for each factor (identify each barrier to success and provide a recommended countermeasure or compensating action that the company could implement to reduce the risk of failure). This section will expand upon your “barriers to success” as discussed in Project #2.

· Section Title Slide: Summary & Recommendations

· Content Slide: present a recommendation that the strategy & implementation plan be approved by the Board of Directors for adoption and implementation by the company. Include 5 major business benefits of adoption and implementation. This may be new content (not previously included in projects 1 & 2).

· Section Title Slide: References

· Content Slides(s) that include reference list entries for your resources. Do not cite your own work for Projects 1 & 2.

Putting It All Together

MS Power Point .pptx format is the preferred delivery format; this application can be accessed via the Web or downloaded from UMGC under the university’s enterprise license for student use of Office 365. For more information see:

If you are unable to use Power Point, you may use another presentation application to create your slides and speaker notes. After you have done so, print your presentation slides to PDF and deliver the assignment as a PDF document. If you deliver as PDF, you must make sure that your speaker notes are visible and accompany each slide.

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your presentation should be professional in appearance with consistent use of fonts, font sizes, margins, etc.

3. You must include a title slide with the assignment title, your name, and the due date. Your reference list must be on a separate slide at the end of your file.

4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). To reduce visual clutter, you may put citations for sources into footnotes at the bottom of your slides (instead of putting citations at the ends of bullet points).

Copyright © 2022 by University of Maryland Global Campus. All rights reserved.

image1.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Network Design and Plan Purpose

Please review attachment Mod 4 Project: Network Design and Plan Purpose In this module, we will introduce a course design project that will be completed in four parts during the course. This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation

Memecoins & Stablecoins Development

Please take a look at the attachment. Lab #3: Blockchain-Based Ecosystems: Memecoins & Stablecoins Development, Attack Simulation, and Auditing Lastname: ______________ First name:____________Date_______ TA_Prove_ Yes/No 1. Overview This lab guides students through designing, implementing, deploying, testing, and auditing a simple memecoin (ERC‑20) and a minimal ecosystem around it (liquidity pool,

Blockchain Presentation

presentation about a blockchain Term Project CIS 5730- Blockchain Application Project Guideline Part ii–Presentation Along with the project you will present what you did to the class in a short presentation. If you want, you can demonstrate the project, or just present an overview of what you did. Presentations should

Network Threats

  Questions: Below is a list of common network attacks: Distributed Denial of Service (DDoS) DNS poisoning ARP poisoning Domain hijacking MAC flooding MAC cloning Man-in-the-Middle Explain two of these network attacks and discuss methods/techniques for protecting the network against them.

Best Practices for Role-Based Privilege Management in Databases

  Research the best practices for managing and securing role-based privileges in databases and address the following questions in your discussion post:  What are the key challenges in managing role-based privileges, and how do they impact database security? Can you provide a real-world scenario where poor role-based privilege management led

Computer Science Cloud Computing assignment

Please see attachment for details 4 [ Note: To complete this template, replace the bracketed text with your own content. Remove this note before you submit your paper.] Cloud Computing Evaluation Paper 1 Cloud Computing [Differentiate between cloud computing models and their uses. What are the different types of deployment

Computer Science- Python Python Programming Assignment

Computer Science Python Programming Lab assignment help. Design a Python program that calculates a credit card customer’s minimum payment based on their balance. Please use If Else and elif statements in your code. You must add comments in your code. Please round the minimum payment to two decimal places using

Blockchain Application

I need help with my coursework project. Let me know if you need any help from me.  Lab 2: Blockchain-Based Academic Credentials Lab Lastname: ______________ Firstname:________________ 1. Overview AETHELRED UNIVERSITY Registrar’s Office wants to start issuing a digital transcripts and diploma for graduating students. You are called to build the

LOREM, IPSUM

The ability to develop a risk register is a skill needed by all cybersecurity leaders when assessing cybersecurity risks. A risk register provides a detailed listing of known risks as well as quantitative or qualitative assessments of those risks, resulting in the prioritization of action.

Virtual LANs

  Questions: A VLAN allows different devices to be connected virtually to each other as if they were in a LAN sharing a single broadcast domain. 1. Why a network engineer would want to deploy VLANs? 2. How do VLANs improve network security?

compliance and rules to follow in cybersecurity.

Follow the attached instructions to complete this work. Note: Make sure to follows rubric or aligns with Rubric. Unit 8 Assignment Directions: Case Study Review the following hypothetical case study. Consider the big-picture ideas and the specific concerns. Make use of the key terms and concepts from the readings in

Discussion on data ( computer science)

Follow the attached direction to complete this work Unit 7 Discussion   Overview Consider this scenario: PQR Corporation provides facial recognition technology to customers. Its products include customer access to consumer electronics as well as mass surveillance capabilities through networked camera systems. While operating legally, PQR has maintained a low

Computer Science – Machine Learning Python Programming Assignment

Assignment Help. Please don’t forget to add comments in the code Page 1 of 3 NorQuest College – CMPT 1011: Lab Assignment 5 CMPT 1011: Introduction to Computing Lab Assignment 2: Variables, mathematical operations and data types Value This coding challenge is worth 3% of your final grade. Background In

Public safety Communications

Subscribe The Communications and Cyber Resiliency Toolkit provides guidance for establishing resiliency measures, public safety communications can better withstand potential disruptions to service. This toolkit, developed by CISA, describes networks and systems critical to successful communication and cyber resiliency and possible threats while providing many resources and additional links for

Case Study 4 o Data (computer)

Follow the attached instructions to complete this work Unit 4 Case Study Directions Review the following case study. Consider both the big-picture ideas and the specific concerns. Make use of the key terms and concepts from the readings in your written responses to the questions below. The case study paper

Discussion 5 and 6

Follow  the attached instructions to complete this work Unit 5 Discussion   Overview In this discussion, you will be considering the emphasis on aspects such as privacy and safety. You will reflect on the significance of the legal concerns and goals of public-private partnerships to address cybersecurity. You will also

SQL injection

Hey! ????  I need an expert in SQL injection, DDOS attack, Code injection attack, XSS attack! To talk further please contact me on discord at mara411 so we can talk more freely and then I will hire you on here! Thanks ????