More Subjects
Week 8 Forum Post
Kennith Thurman
School or Institution Name (University at Place or Town, State)
Week 8 Forum Post
Closeout meetings of organizations related to information security assurance based on capability maturity models can prove to be the path changer as well. Key stakeholders must participate in the closeout meeting along with the security teams of the organization. In closeout meeting, the stakeholders have to decide on an appropriate capability maturity for information security with a unique balance of security and usability. The capability maturity model is designed to help organizations to choose a framework that provides the best security without compromising on the usability of the system ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1s0j0bu1ha","properties":{"formattedCitation":"(Glumich, Riley, Ratazzi, & Ozanam, 2018)","plainCitation":"(Glumich, Riley, Ratazzi, & Ozanam, 2018)"},"citationItems":[{"id":2034,"uris":["http://zotero.org/users/local/gITejLE9/items/PNK2WUHT"],"uri":["http://zotero.org/users/local/gITejLE9/items/PNK2WUHT"],"itemData":{"id":2034,"type":"paper-conference","title":"BP: Integrating Cyber Vulnerability Assessments Earlier into the Systems Development Lifecycle: A Methodology to Conduct Early-Cycle Cyber Vulnerability Assessments","container-title":"2018 IEEE Cybersecurity Development (SecDev)","publisher":"IEEE","page":"77-84","ISBN":"1-5386-7662-1","author":[{"family":"Glumich","given":"Sonja"},{"family":"Riley","given":"Juanita"},{"family":"Ratazzi","given":"Paul"},{"family":"Ozanam","given":"Amanda"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Glumich, Riley, Ratazzi, & Ozanam, 2018). Most secure system disconnected from everything will also become the most useless system as well. Therefore, a closeout meeting plays a key role in the choice of the appropriate security framework for the organizations.
It may change the future directions of the company to achieve business goals without compromising on information security. The meeting will help organizational stakeholders to achieve primary security goals of confidentiality, integrity, availability, and non-repudiation. Closeout meetings contribute significantly to the security planning of organizations ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1oq2tfs2pa","properties":{"formattedCitation":"(Safa, Von Solms, & Furnell, 2016)","plainCitation":"(Safa, Von Solms, & Furnell, 2016)"},"citationItems":[{"id":2037,"uris":["http://zotero.org/users/local/gITejLE9/items/QICJW5ZM"],"uri":["http://zotero.org/users/local/gITejLE9/items/QICJW5ZM"],"itemData":{"id":2037,"type":"article-journal","title":"Information security policy compliance model in organizations","container-title":"Computers & Security","page":"70-82","volume":"56","author":[{"family":"Safa","given":"Nader Sohrabi"},{"family":"Von Solms","given":"Rossouw"},{"family":"Furnell","given":"Steven"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Safa, Von Solms, & Furnell, 2016). Information security is of vital importance, and stakeholders have to decide for a secondary solution investment to protect primary installations of information technology systems. Therefore, heads of all departments along with security teams must participate in closeout meetings.
References
ADDIN ZOTERO_BIBL {"custom":[]} CSL_BIBLIOGRAPHY Glumich, S., Riley, J., Ratazzi, P., & Ozanam, A. (2018). BP: Integrating Cyber Vulnerability Assessments Earlier into the Systems Development Lifecycle: A Methodology to Conduct Early-Cycle Cyber Vulnerability Assessments. 2018 IEEE Cybersecurity Development (SecDev), 77–84. IEEE.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70–82.
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net