Colorado State University JPMorgan Chase and Co Security Program Essay

User Generated

mznevfby5

Computer Science

Colorado State University Global Campus

Description

Module 8 Portfolio Project: Prepare a well written

security program proposal for your organization that utilizes the

concepts learned in the course as a basis for your analysis and proposed

solution.

Make sure that your proposal includes these basic elements of a good security policy:

  1. An introduction that describes your organization, its mission, products/services, technical resources, and technical strategy.
  2. An assessment of the impact on organizational culture from implementing information security.
  3. An assessment of likely challenges in implementing and sustaining the proposed information security program.
  4. Your recommendation for a security program should:
    1. Propose a set of information security positions and titles and define the roles information security personnel will have in the new organization.
    2. Include an organizational chart that reflects the proposed security personnel.
    3. Describe security education and trainingโ€”who is trained on what subjects and how often.
    4. Consider security awarenessโ€”how to incorporate information security awareness throughout the organization.
    5. Summarize your security program recommendations.

Important: You must justify every element of your proposal in ethical and legal terms. In other words, you need to state why each policy/code element (including technical elements) is good for business and why it is good/sound ethical policy (how it is good for the organization and why it is good for customers, users, or employees, or the public). You should also identify any ethical/legal tensions, conflicts, and/or contradictions and justify any trade-offs being made in the recommendation.

Discuss and cite at least three credible or scholarly sources other than the course textbooks (which can be cited as well) to support your analysis and policy choices. Your paper should be 8-10 pages in length with document and citation formatting per APA Guideline.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Kindly check

JPMorgan Chase and Co. Security Program
Thesis Statement: Enforcing cybersecurity in JPMorgan Chase bank, by preventing, identifying,
and reacting to threats, both externally and internally, will protect the infrastructure and
information possessions it utilizes. Top management and IT are also part of the information
security policy of the company.
โžข Introduction
โžข Organizationโ€™s culture effects for implementing information security
โžข Challenges faced when executing and satisfying information security program
โžข Information security positions and titles
โžข Roles of information security personnel
โžข An administrative chart reflecting the security personnel
โžข Security education and training
โžข Incorporating information security awareness in the organization
โžข Security program recommendations
โžข Conclusion


Running head: JPMORGAN CHASE AND CO. SECURITY PROGRAM

JPMorgan Chase and Co. Security Program
Studentโ€™s name
Institutional affiliation

1

JPMORGAN CHASE AND CO. SECURITY PROGRAM

2

JPMorgan Chase and Co. Security Program
Introduction
JPMorgan Chase & Co. is one of the top and major banks in the United States. It is a
financial service holding company and an investment bank that operates multi-nationally. The
bank was founded in the year 2000 and had its headquarters in New York City. The companyโ€™s
divisions include; community and consumer banking, wealth and asset management, investment
and corporate banking, and commercial baking. It is considered as a universal and a custodian
bank. Some of the bank's products include; alternative finance services, exchange-traded funds,
information processing, investment capital, debt settlement, asset allocation and management,
investment portfolios, pension funds, risk management, venture capital among others. The
institution's mission statement is to be the best financial service company in the world under the
motivation of their excellent platform and great heritage since all that id within their reach. Various
technical resources of the bank include; location, working personnel, office equipment, and
distribution channels, among others. The technical strategy of the bank is to provide adequate
services to all customers and shareholders.
Organizationโ€™s culture effects for implementing information security
Enforcing cybersecurity in JPMorgan Chase bank, by preventing, identifying, and reacting
to threats, both externally and internally, will protect the infrastructure and information
possessions it utilizes. Top management and IT are also part of the information security policy of
the company. Still, in small companies, this role is likely to focus on risk and protection, data and
enforcement, and IT and data security supervisors and managers (sometimes only one person).
Improving employee understanding of information security risks through coaching and campaigns
is critical to sustaining the information security strategic plan. Organizations will need to

JPMORGAN CHASE AND CO. SECURITY PROGRAM

3

implement and periodically update their information security approaches to improve security
standards. Threats and weaknesses need to be measured and analyzed. That means setting up and
enforcing control processes and procedures to mitigate risk and reporting to assess control
efficiency (Chang, & Ho, 2006).
Cultural identity even plays a significant part in the bankโ€™s identity. Providing and fostering
a healthy atmosphere for the workers can be very valuable to help improve overall employee
engagement. Structuring an enterprise with an "open communication" is becoming increasingly
common. Nevertheless, critics also prey upon institutions perceived to have a culture of open
communicat...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags