The power point below shows step-by-step how to create an outline. Please start


Place your order now for a similar assignment and have exceptional work written by our team of experts, At affordable rates

For This or a Similar Paper Click To Order Now

The power point below shows step-by-step how to create an outline. Please start the outlining form in sections 4, 5 and 6, slides 45–61. The subject of the project plan is Chase Bank. It should be similar to the document below, titled “Annotated Outline.”
Also, follow these requierments 4.1 Highest Prioritized Risks
The section identifies the top 3 risks that you are planning to mitigate in Section 5. Two out of your three risks must address the specific risks that may arise out of the “Situation as You Briefed the BOD and Executive Management” Slide 12 from the Enterprise Information Security Program Plan Project assignment presentation.
Each risk must have the following items included with each risk:
• Asset(s) potentially affected
• Threat or threat actors
• Vulnerability(ies)
• Impact if realized
• Time period that you believe risk remains active.
Use Group results from risk exercise as a starting point.
The resulting risk statement must be in the form of a risk statement-Module 6’s “Risk Exercise will demonstrate how this can be done and what is expected.
Note: This is not meant to be a risk equation, but an understanding of the basic components of the risks that you have identified and how to craft a risk statement
1.1.1 Risk 1
This section will identify Risk 1. It will be in the form of a risk statement. The associated items listed above will be addressed.
1.1.1.1 Asset(s) potentially affected
This section will identify the asset(s) potentially affected by Risk 1.
1.1.1.2 Threat or threat actors
This section will identify the treat or threat actors associated with Risk 1.
1.1.1.3 Vulnerability(ies)
This section will identify any vulnerabilities associated with Risk 1.
1.1.1.4 Impact if realized
This section will identify the impact if realized of Risk 1. The impact should tie back to the business being able to achieve its Strategic, Operational, or Tactical objectives.
1.1.1.5 Time period
This section will identify the time period that we believe Risk 1 will remain active.
1.1.2 Risk 2
This section will identify Risk 2. It will be in the form of a risk statement. The associated items listed above will be addressed.
1.1.2.1 Asset(s) potentially affected
This section will identify the asset(s) potentially affected by Risk 2.
1.1.2.2 Threat or threat actors
This section will identify the treat or threat actors associated with Risk 2.
1.1.2.3 Vulnerability(ies)
This section will identify any vulnerabilities associated with Risk 2.
1.1.2.4 Impact if realized
This section will identify the impact if realized of Risk 2. The impact should tie back to the business being able to achieve its Strategic, Operational, or Tactical objectives.
1.1.2.5 Time period
This section will identify the time period that we believe Risk 2 will remain active.
1.1.3 Risk 3
This section will identify Risk 3. It will be in the form of a risk statement. The associated items listed above will be addressed.
1.1.3.1 Asset(s) potentially affected
This section will identify the asset(s) potentially affected by Risk 3.
1.1.3.2 Threat or threat actors
This section will identify the treat or threat actors associated with Risk 3.
1.1.3.3 Vulnerability(ies)
This section will identify any vulnerabilities associated with Risk 3.
1.1.3.4 Impact if realized
This section will identify the impact if realized of Risk 3. The impact should tie back to the business being able to achieve its Strategic, Operational, or Tactical objectives.
1.1.3.5 Time period
This section will identify the time period that we believe Risk 3 will remain active.
5 Information Security Policies, Procedures, Standards, or Processes
This section will prioritize listed on Project Plan Assignment using a scale from 1-10 (1 being the highest and 10 being the lowest) and state why our team rated each item the way we did demonstrating a risk-based approach given scare resources for those items listed on Project Plan Assignment. write a summary for this section
6 Information Security Programs
This section needs to address what are the top 4 programs that you as the CISO are to execute within the first 6 months to year with possible identification of additional programs required to execute an effective information security program that counters the identified risks in the Information Security Section. You can include more than 4 program if you wish, but only the first 4 will be graded.
There is an alternative means in grouping risks rather than having them identified in each program, and that approach will be discussed during the programs lab exercise in Module 7.
3.1 Program 1
Name your first program in place of Program 1
3.1.1 What risk(s) stated in the Information Security Section are you addressing with this proposed program
This section identifies which risk(s) from section 4.12 you are addressing with your identified Program 1
3.1.2 Why you are initiating/doing this program
This section answers why you are doing your selected program as it provides context as to how you are addressing the risk(s) identified above.
3.1.3 What you are going to do within the program
This section provides sufficient detail as to what you are doing in your program. It is expected that this section could contain several (more than two) paragraphs detailing what you are going to do. This section does not have to be a book, but should provide sufficient information that one can understand what you are attempting to do. Each paragraph should be between 6-8 sentences in length.
3.1.4 What are your expected outcomes and how are you measuring these expected outcomes
This section identifies what are your expected outcomes and how you are going to measure them. There should be at least 3 measurable items.
3.1.5 What is your timeline for implementation
This section provides an implementation time line as to how long this program will last or it may be a start of a series of programs that will build a capability.

For This or a Similar Paper Click To Order Now


Leave a Reply