CyberTech is a medium sized web application company that provides different software to its customers on SAS (Software as Service) model. CyberTech LLC, Abu Dhabi has been recently established and currently going through organizational infrastructure buildup. As an independent Information Security Consultant, CyberTech approached you to help with the process. You are required to help CEO in following task. Develop information security department hierarchy along with its placement within organization. Take Wood’s options as reference. Establishing Staffing requirements for an effective security program for the organization. Define responsibilities of different job roles established in sec B.

Practical Management Science
6th Edition
ISBN:9781337406659
Author:WINSTON, Wayne L.
Publisher:WINSTON, Wayne L.
Chapter2: Introduction To Spreadsheet Modeling
Section: Chapter Questions
Problem 20P: Julie James is opening a lemonade stand. She believes the fixed cost per week of running the stand...
icon
Related questions
icon
Concept explainers
Topic Video
Question

CyberTech is a medium sized web application company that provides different software to its customers on SAS (Software as Service) model. CyberTech LLC, Abu Dhabi has been recently established and currently going through organizational infrastructure buildup.
As an independent Information Security Consultant, CyberTech approached you to help with the process. You are required to help CEO in following task.

  1. Develop information security department hierarchy along with its placement within organization. Take Wood’s options as reference.

  2. Establishing Staffing requirements for an effective security program for the organization.

  3. Define responsibilities of different job roles established in sec B.

 

 

medium-sized company.
As an independent Information Security Consultant, you are required to help CEO with the
following task.
A) Develop information security department hierarchy along with its placement within the
organization. Take Wood's options as a reference.
Departments not related to
Information Security have been
omitted from diagram for clarity.
Audit
Committee
Information Security
Management
Committee
Воard
CEO
Internal
Audit
Strategic
Planning
Marketing
& Sales
Administration
Services
Information
Technology
Legal
Business
Contingency
Planning
Systems
Development
EDP
Physical
Security
Public
Relations
Physical
Security
Human
Resources
Audit
Quality
Assurance
Personnel
Security &
Safety
Risk &
Information
Records
Systems
Development
Consulting on
Security
Insurance
Security
Management
Systems &
Network
Administration
Internet
Commerce
Systems
Contingency
Planning
Database
Administration &
Data Warehousing
Telecom-
munications
Computer
Emergency
Response
Computer &
Network
Operations
Help Desk
Figure 5-7 Wood's Option 3: InfoSec reporting to administrative services
department
B) Establishing Staffing requirements for an effective security program for the organization.
Security
manager
Security
administrator
Security
technician
1 Full-time manager and partial-support staff members
Figure 5-3
in a medium-sized organization
Example of InfoSec staffing
C) Define responsibilities of different job roles established in sec B.
Transcribed Image Text:medium-sized company. As an independent Information Security Consultant, you are required to help CEO with the following task. A) Develop information security department hierarchy along with its placement within the organization. Take Wood's options as a reference. Departments not related to Information Security have been omitted from diagram for clarity. Audit Committee Information Security Management Committee Воard CEO Internal Audit Strategic Planning Marketing & Sales Administration Services Information Technology Legal Business Contingency Planning Systems Development EDP Physical Security Public Relations Physical Security Human Resources Audit Quality Assurance Personnel Security & Safety Risk & Information Records Systems Development Consulting on Security Insurance Security Management Systems & Network Administration Internet Commerce Systems Contingency Planning Database Administration & Data Warehousing Telecom- munications Computer Emergency Response Computer & Network Operations Help Desk Figure 5-7 Wood's Option 3: InfoSec reporting to administrative services department B) Establishing Staffing requirements for an effective security program for the organization. Security manager Security administrator Security technician 1 Full-time manager and partial-support staff members Figure 5-3 in a medium-sized organization Example of InfoSec staffing C) Define responsibilities of different job roles established in sec B.
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Inventory management
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, operations-management and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Practical Management Science
Practical Management Science
Operations Management
ISBN:
9781337406659
Author:
WINSTON, Wayne L.
Publisher:
Cengage,
Operations Management
Operations Management
Operations Management
ISBN:
9781259667473
Author:
William J Stevenson
Publisher:
McGraw-Hill Education
Operations and Supply Chain Management (Mcgraw-hi…
Operations and Supply Chain Management (Mcgraw-hi…
Operations Management
ISBN:
9781259666100
Author:
F. Robert Jacobs, Richard B Chase
Publisher:
McGraw-Hill Education
Business in Action
Business in Action
Operations Management
ISBN:
9780135198100
Author:
BOVEE
Publisher:
PEARSON CO
Purchasing and Supply Chain Management
Purchasing and Supply Chain Management
Operations Management
ISBN:
9781285869681
Author:
Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. Patterson
Publisher:
Cengage Learning
Production and Operations Analysis, Seventh Editi…
Production and Operations Analysis, Seventh Editi…
Operations Management
ISBN:
9781478623069
Author:
Steven Nahmias, Tava Lennon Olsen
Publisher:
Waveland Press, Inc.