Your policies need high visibility to be effective. When implementing policies, you can use various methods to spread the word throughout your organization. Use management presentations, videos, panel discussions, guest speakers, and road shows, in a manner that ensures that management’s support is clear, especially where employees feel overwhelmed with policies, directives, guidelines, and procedures
Week 14 SEcurity Policy Framework Case Study.pdf
Click for more options
Based on the above case study or the Case Study on Page 168 of your text, write a 3 – 6 page paper to include the below information:
Assign roles and responsibilities for employees at varying levels in the corporate hierarchy that are responsible for security policies.
Analyze risk assessment and risk mitigation strategies and policy needs based on best practices
Summarize your findings
Include proper APA citations for any references you use in your research. Ensure you have proper spelling, grammar, and mechanics throughout your writing.
Please name your file Lastname_14_CaseStudy_Assignment.doc and submit it according to the directions below.
Select the Submit Assignment button to the right. Click Choose File, located in the File Upload box. Navigate to your file location. Once the file is located, select it and then select the Open button. Click Submit Assignment to complete the upload process.
Rees, J., BANDYOPADHYAY, S., & SPAFFORD, E. H. A Policy Framework for Information Security. Commuunication of the ACM, 46.
Tags: security policy data security Virginia International University chief security officer Technology Officer security invest