Evan Anderson
IS4550
Security Policies and Implementation
Unit 2 (June 24, 2016)
Risk Mitigation and Business Support Processes
Learning Objective
- Analyze how security policies help mitigate risks and support business processes in various domains in the IT infrastructure.
Key Concepts
- Business challenges in each IT domain
- Risk mitigation in seven IT domains
- Organizational hurdles to policy implementation
- Policy implementation issues related to humans in the workplace
- Executive management
Assigned Reading
- Johnson and Merkow, Chapter 4: Business Challenges Within the Seven Domains of IT Responsibility.
- Johnson and Merkow, Chapter 5: Information Security Policy Implementation Issues.
- How Will Brexit Affect the Cybersecurity Industry in the UK and Europe? (SC Magazine)
- The Social Dilemma of Self-Driving Cars (YouTube)
Keywords
- Risk Mitigation
- Information Technology (IT) Risks, Threats, Vulnerabilities
- Security Countermeasures
- Strategies
- Cyber Criminals
- Vulnerability Window
- Compliance Officer
- Data Custodian
- Data Manager
- Data Owner
- Information Technology (IT) Domain
- Business Challenges
Assignments and Study Materials
- Unit 2 Lecture Slides
- Unit 2 Discussion 2.1: Risk Mitigation
- Unit 2 Lab 2.2: Develop an Organization-Wide Policy Framework Implementation Plan
- Unit 2 Assignment 2.3: Good Policy Implementation
Questions and Feedback
Use the form below to ask questions or provide feedback about the concepts covered during Unit 2's session of class: