Corporate Governance Issues: IT Risk Management, writing homework help

User Generated

puevfgvar15

Writing

Description

Discussion.

1. Corporate Governance Issues: IT Risk Management

Review the Week 1 readings and the assigned Case Study for background information before responding to this discussion question.

The company's senior managers are reviewing the company's Annual Report which will be presented at the next quarterly shareholder's meeting. The annual report includes the following risk statements:

1. Cyber-attacks could affect our business.

2. Disruptions in our computer systems could adversely impact our business.

3. We could be liable if third party equipment recommended and installed by us, i.e. smart home controllers, fails to provide adequate security for our residential clients.

Write a two page briefing paper (five to seven paragraphs) which can be used by a member of the corporate board to explain these risks to shareholders. Provide specific examples of the types of risk events which could occur and the potential impacts (e.g. financial, reputation, client trust, etc.)

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

2.Policies to Implement Regulatory Requirement


Review the Week 2 readings and the assigned Case Study for background information before responding to this discussion question.

The company's IT Governance Board has been tasked with developing a set of policies to address IT security requirements arising from

(a) PCI-DSS (credit card and transaction information)
(b) the HIPAA Security Rule (health related information)
(c) the "Red Flags" Rule (consumer credit information: identity theft prevention).

Choose one of the three sources of regulatory requirements listed above. Write a three paragraph briefing statement which summarizes the regulatory requirements as they apply to the company's collection, processing, management, and storage of personal information about its clients. Your briefing statement should identify the specific types of personal information which are covered by the "rule" or "standard."

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

hey christine, i have added more references as requested, kindly confirm.Thanks

Running Head: CORPORATE GOVERNANCE

Corporate Governance
Author
Institution

1

CORPORATE GOVERNANCE

2

In our modern world, businesses have become so much reliant on the ability to use computers
for managing their daily activities like sales, transactions, purchases and orders as well as keeping
business records. In fact, it has grown one of the key reasons for the success of a business enterprise
be it wholesale or retail markets. Due to this, there has been so much concern in keeping the system
as more stable, reliable and safe as much as possible so as to minimize unauthorized access or
damage to the company’s computer system. Some of these risks on our computer system are well
known to us. These are cyber-attacks, disruption in our computer system and failure of our third
party equipment to provide adequate security to our system (Bendovschi, 2015).
Cyber-attack is a deliberate attack generated from one computer or more, from another
computer, computer system or computer software with the intention of altering or gaining
unauthorized access to the information stored in it.
This risk can occur in our company’s computer system ways...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags