Sunday, May 5, 2019
The Rookie Chief Information Security Officer Term Paper
The Rookie Chief Information surety Officer - Term Paper ExampleThe human resource management department, finance department and moderateing out department should present the shelter challenges faced (Cullen, 2011). IT Compliance Officer, auspices Officer, Privacy tribute Personnel and IT Security Engineer should also present the problem faced in their daily duties. The report from each region and department should be presented to the Chief Information Security officer for evaluation. Security manager and CISO pass on theatrical role the report to implement policies and procedures, which go out warrant sufficient security in the organizations. After evaluation of the report, they volition recommend the applicable points and do away with points which will not lead to improvement of the security. They will halt professional ethics and come up with other policies left by the departments. After completion, they will foregoing the engage to the General Manger. The GM will f orward to the Board of Directors who will hold a skirmish with the Security Manger and CISO to adjudicate each policy and procedure. After evaluation, the board of directors will sign the draft for approval. Then the security department will ensure that each employee in every department has a copy or is aware of the policies. Security department will also ensure sufficient cookery to all departments to create awareness of security policies to each employee. The employees will help in reinforcing the policies (Neil, 2009). ii. Reporting structure Chain of command will ensure smooth running of the organization. Each employee will be report to the person next in command. The organizational chart above represents the reporting channel. Security guarding and escort run will be provided by a promise guard force. Guard will provide somatogenetic security services, public relationship services and patrol and escort services. Guards will ensure sufficient security for the organizatio ns asset and employees. They will provide assistant to customers visiting the organization by present them location of offices. The guards will be managed by their supervisor who will report directly to the Security Officer. Security Officer will be responsible for maintenance of physical security. He/she will ensure that the contracted guard force maintains discipline and ethics (Mark, 2007). He will also check and record the open assets each day and carry out investigation in case of stealing. Security officer will report direct to the CISO. The IT Security Engineer and the IT Security Compliance Officer will work to ensure that the information technology devices are maintained. They will ensure the hardware and software are maintained. They will evaluate the effectiveness of each device. They will provide a report in case of damage, loss and substitute of devices. They will report direct to the CISO. The Privacy Security Professional or the Investigation Officers will check theft, fraud and employee dishonest. They will carry out investigation in case of asset theft, cash theft by employees and misconduct of the employee (Neil, 2009). In case of conflict between the employees, the investigation officer will carry out an inquiry to establish the source of the problem. Privacy Security Professionals will report direct to the CISO. The CISO will report to the Security Manager. The Security manager will be respons
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.