Summary ToDo List
docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
4640
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
9
Uploaded by lashee86
Unit 3 Strategy
Learning Objective
CISO and Developing a Security Strategy
CISO and Emerging Technologies and Trends
Concepts
Four Ways Organizations Develop Cybersecurity Strategy
Cybersecurity Strategy Development Framework
Company Culture
Government Regulations
Reading
Review the Required Readings assigned for this lesson from your textbook, CISO Compass, 1st edition:
Chapter 3, “Strategy”
Keywords
Use the following keywords to search for additional materials to support your work:
Cybersecurity
Strategy
Alignment
Governance
Controls
Risk Management
Physical security
Privacy.
To-do list
1.
Reading Assignment:
Chapter 3 2.
Review Lecture Notes and Slides:
a.
Course introduction.
b.
Chapter 3 - slides
3.
Lecture/Discussion attendance:
a.
Attend Class Sessions (on-ground course) or weekly Seminar for online classes (see D2L calendar for date and time). Note for online courses, if you are unable to attend the seminar, you may submit two-page summary report of the week’s reading materials as a
substitute for attendance without loss of points.
4.
Complete Discussion Post:
a.
Introduce yourself in the discussion forum. Create a quality post of approximately 100 words and reply to at least 2 other student posts.
5.
Complete Assignment & Assessments:
a.
Complete HW3
b.
No lab
c.
Graduate students
: complete graduate reading assignment.
d.
See assessment part of this document for specifics.
Learning Materials
This is where class notes and other materials related to the lesson will be placed. Links to all audio, video, plug-in, Flash file, charts, diagrams, etc. for the unit are accessible from this page. Learning materials for each chapter should be reviewed after the readings.
Chapter 3
Lecture slides: I Chapter 3, “Strategy
Resources
Unit 1 1.
Isaac, M. 2012. Mark Zuckerberg on Facebook’s Early Days: Go Hard or Go Home All Things D
(October 20).
http://allthingsd.com/20121020/mark-zuckerberg-on-facebooks-early-days-go-
hard-or-go-home/
.
2. Gartner News Room. 2017. Gartner Forecasts Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent (December 17).
www.gartner.com/newsroom/id/3836563
.
3. Kennedy, B. and Funk, C. 2016. 28% of Americans are ‘Strong’ Early Adopters of Technology. Pew Research Center (July 12).
http://www.pewresearch.org/fact-tank/2016/07/12/28-of-
americans-are-strong-early-adopters-of-technology/
.
4. Zwilling, M. 2014. Early Adopters Are Great, But They Aren’t Most Customers. Entrepreneur Europe (November 14).
www.entrepreneur.com/article/239606
.
5. Warren, T. 2016. Tesla has received almost 400,000 preorders for the Model 3. The Verge (April 21).
www.theverge.com/2016/4/21/11477034/tesla-model-3-preorders-400000-elon-musk
.
6. Nelson, G. 2015. Tesla Meets Model S Production Goal, But Losses Widen Automotive News (February 11).
www.autonews.com/article/20150211/OEM/150219951/tesla-meets-model-s-
production-goal-but-losses-widen
.
7. Wisniewski, M. 2013. Mobile Check Deposit Boom Brings Risks. American Banker (July 11).
www.americanbanker.com/news/mobile-check-deposit-boom-brings-risks
.
8. Gartner News Room. 2016. Gartner Says By 2020, a Corporate “No-Cloud” Policy Will Be as Rare
as a “No-Internet” Policy Is Today (June 22).
www.gartner.com/newsroom/id/3354117
.
9. Mitchell, J. 2018. How Machine Learning and Other Tech Trends Will Disrupt Cyber Security In 2018.
Forbes
(January 31).
www.forbes.com/sites/julianmitchell/2018/01/31/how-machine-
learning-and-other-tech-trends-will-disrupt-cyber-security-in-2018/#36c281948009
.
10. Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018. Security Intelligence (January 2).
https://securityintelligence.com/five-new-years-resolutions-to-help-cisos-
improve-enterprise-security-in–2018/
.
11. Bitcoin USD.
https://finance.yahoo.com/chart/BTC-USD
.
12. Cao, S. 2018. $500M of Digital Coins Stolen on Japan’s Largest Crypto Exchange.
Observer
(January 26).
http://observer.com/2018/01/500m-digital-coins-stolen-japans-
largest-crypto-exchange/
.
13. Bitcoin. Securing Your Wallet.
https://bitcoin.org/en/secure-your-wallet
.
14. Carmody, B. 2018. 7 Ways Blockchain Will Enable Entrepreneurs in 2018. Inc.
www.inc.com/bill-
carmody/7-ways-blockchain-will-enable-entrepreneurs-in-2018.html
.
15. Meola, A. 2016. Internet of Things in healthcare: Information Technology in Health. Business Insider.
www.businessinsider.com/internet-of-things-in-healthcare-2016-8
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
16. Gartner, Inc. 2016. Gartner Says By 2020, More Than Half of Major New Business Processes and Systems Will Incorporate Some Element of the Internet of Things. Gartner Newsroom (January 14).
www.gartner.com/newsroom/id/3185623
.
17. Shaban, H. 2018. Amazon is Issued Patent for Delivery Drones That can React to Screaming Voices, Flailing Arms. The Washington Post (March 22).
http://www.washingtonpost.com/news/the-switch/wp/2018/03/22/amazon-issued-patent-for-
delivery-drones-that-can-react-to-screaming-flailing-arms/?utm_term=.dea0a56797b5
.
18. Frank, M. 2016. Drone Privacy: Is Anyone in Charge? Consumer Reports (February 10).
http://www.consumerreports.org/electronics/drone-privacy-is-anyone-in-charge/
.
19. National Conference of State Legislatures. 2018. Current Unmanned Aircraft State Law Landscape.
Blog (February 1).
www.ncsl.org/research/transportation/current-unmanned-aircraft-state-law-
landscape.aspx
.
20. Howell O’Neill, P. 2017. Ransomware is Now a $2 Billion-Per-Year Criminal Industry. Cyberscoop (November 21).
http://www.cyberscoop.com/ransomware-2-billion-bitdefender-gpu-
encryption/
.
21. Europol. 2017. 2017, The Year When Cybercrime Hit Close to Home. (November 27).
www.europol.europa.eu/newsroom/news/2017-year-when-cybercrime-hit-close-to-home
.
22. Department Health and Human Services. Fact Sheet: Ransomware and HIPAA.
www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf
.
23. Los Angeles Times. 2011. Watson Wins ‘Jeopardy!’ Finale; Ken Jennings Welcomes ‘Our New Computer Overlords’. (February 16).
http://latimesblogs.latimes.com/showtracker/2011/02/watson-
jeopardy-finale-man-vs-machine-showdown.html
.
24. Government Publishing Office. 1998. 63 FR 41804- Presidential Decision Directive 63 on Critical Infrastructure Protection: Sector Coordinators. Federal Register Volume 63, Issue 150. (August 5).
www.gpo.gov/fdsys/granule/FR-1998-08-05/98-20865
.
25. U.S. Department of Homeland Security. 2015. Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection. 1st Ed Dec 17, 2003, last published September 22, 2015.
www.dhs.gov/homeland-security-presidential-directive-7
.
26. Reuters. 2016. SWIFT Tells Banks to Share Information on Hacks. (May 20).
www.cnbc.com/2016/05/20/swift-tells-banks-to-share-information-on-hacks.html
.
27. Swift. Customer Security Programme.
www.swift.com/myswift/customer-security-programme-
csp/programme-description
.
28. Swift. 2018. Fraud and Cyber High Alert. (March 19).
www.swift.com/news-events/news/fraud-
and-cyber-high-alert
.
29. The ThreatHunting Project.
http://www.threathunting.net/
.
30. MacDonald, N. 2017. 10 Things to Get Right for Successful DevSecOps. Gartner. October 3.
www.gartner.com/doc/3811369/-things-right-successful-devsecops
.
31. Granville, K. Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens. New York Times (March 19).
www.nytimes.com/2018/03/19/technology/facebook-cambridge-
analytica-explained.html
.
32. Columbus, L. 2017. 2017 State of Cloud Adoption and Security. Forbes (April 23).
www.forbes.com/sites/louiscolumbus/2017/04/23/2017-state-of-cloud-adoption-and-security/
#7c032bd21848
.
33. Goodman, M. 2015.
Future Crimes
. New York. Doubleday/Random House.
Unit 2
1. Waterman Jr., R., Peters, T., and Phillips, J. 1980. Structure Is Not Organization.
http://tompeters.com/docs/Structure_Is_Not_Organization.pdf
.
2. Think Marketing. 2016. Have You Ever Read about Apple’s Core Values? (January 11).
https://thinkmarketingmagazine.com/apple-core-values/
.
3. Fortune. 2018. 100 Best Companies to Work For.
http://fortune.com/best-companies/list
.
4. Lu, V. 2015. Taxi Companies Fight Uber with Own Updated Apps. The Star (May 20).
www.thestar.com/business/2015/05/20/taxi-companies-fight-uber-with-own-updated-
apps.html
.
5. Leswing, K. 2016. Apple CEO Tim Cook: ‘Companies should have values, like people do’. Business Insider, U.K. (August 9).
http://uk.businessinsider.com/apple-ceo-tim-cook-companies-
should-have-values-like-people-2016-8?r=US&IR=T
6. Peters, T. 1982. In Search of Excellence: Lessons from America’s Best-Run Companies.
7. Zorz, Z. 2018. Researchers Hack BMW Cars, Discover 14 Vulnerabilities. HelpNet Security (May 23).
http://www.helpnetsecurity.com/2018/05/23/hack-bmw-cars/
.
Unit 3
1. Kaplan, J., Sharma, S., and Weinberg, A. 2011.
Meeting the Cybersecurity Challenge
. McKinsey &
Co (June 2011).
www.mckinsey.com/business-functions/digital-mckinsey/our-insights/meeting-
the-cybersecurity-challenge
.
2. Collins, J. 2001.
Good to Great: Why Some Companies Make the Leap and Others Don’t
. New York. HarperCollins Publishers Inc.
3. Fitzgerald, T., Goins, B., and Herold, R. 2007. Information Security and Risk Management.
In Official ISC2
®
Guide to the CISSP CBK
, eds. Tipton, H. A. and Henry, K., 9–17. Boca Raton Auerbach Publications.
4. Kaplan, R. S. and Norton, D. P. 1996.
The Balanced Scorecard, Translating Strategy Info Action
. Boston, MA. Harvard Business School Press.
5. Buzan, T. and Buzan, B. 1996.
The Mind Map
®
Book: How to Use Radiant Thinking to Maximize Your Brain’s Untapped Potential
. Plume. The Penguin Group publishers.
Video Resources
Unit 1
CISO: Your First 90 Days
https://youtu.be/FjVZi1Aw6So
CISO Series
https://www.youtube.com/c/CISOSeries/featured
Best Responses to "22 Effective Information Security Risk Management Techniques" https://youtu.be/_i5BMMT4mgw
Unit 2
The McKinsey 7S Framework
https://youtu.be/DFNJypMOIMI
Unit 3
Seven Security Strategies for CISOs with Richard Bejtlich https://youtu.be/adq_h-uieA4
A CISO Perspective: Building a Modern Security Strategy
https://youtu.be/0Z4CdgqlL_M
Cyber Security Strategy 2020 - Damien Manuel | Australia CISO Confluence 2020 MAG https://youtu.be/jKxpubM_opw
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Discussion
In this section, discussion board assignments will be indicated.
Discussion 1.
Discuss Security Strategy Development – what approach would you implement?
2.
Create a quality post of approximately 100 words and reply to at least 2 other student posts.
3.
Graduate students:
in addition to above, discuss your thoughts regarding the graduate readings.
Create a quality post of approximately 100 words and reply to at least 2 other student posts.
Assessment
In this section, assignments and assessments will be documented if any for each Unit.
Assignment (Hw3)
1.
Reference document 3.30 in the assignment section of unit 3.
Lab
No lab
Quiz
No quiz
Graduate Readings
Reference document 3.32 for reading in the assignment section of unit 3.
Unit 3 Assignments
Points possible Points earned 1.
Assignment & Readings
15
2.
Labs
0
3.
Discussion post 5
4.
Seminar Attendance / Class attendance 5
5.
No quiz
0
Total (Sum of all points)
25
Points deducted for spelling, grammar, and/or MLA errors. Adjusted total points
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help