integrating several aspects of information security/assurance

User Generated

qnaaldat

Computer Science

week

Description

Part 1

Our class focuses on integrating several aspects of information security/assurance. Part of an overall integrated approach to achieving a comprehensive information assurance program is compliance management. As you are aware there are a number of government regulations that affect both the public and private sector. Please read Learn the Science of Compliance.pdf. The author makes a strong case for centralized management of IT compliance and the use of software tools to assist in managing compliance programs.

You are the CISO of a large private financial company that is traded on the NY Stock Exchange. You were tasked by the the CIO to develop an IT compliance management program for your organization. What approach would you take to develop such a program? What regulations impact the organization? Would you consider the use of a compliance tool? If so which one and how would you justify the expense?

Remember to cite your sources and to give a complete answer to the questions posed above.

Part 2

Read the Wachovia Case Study located here, http://gilbane.com/case_studies_pdf/CTW_Wachovia_Final.pdf#_Toc88022904.

Now, select five of the most important concepts that you identified that contributed to the success of integration of IT capabilities. Explain why you chose each one.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: INFORMATION ASSURANCE-COMPLIANCE

Information assurance-Compliance
Student’s name
University affiliation

1

INFORMATION ASSURANCE-COMPLIANCE

2

Information assurance-Compliance
PART 1
Approach taken to develop an IT compliance management program
Developing an IT compliance management program will take seven steps that are well
organized and prepared so that to get to an appropriate compliance program. First, document
policy and control; second determine who will have oversight of the program when it is in
place. Third, make a personal screening and access a priority so that to minimize unauthorized
access. After personalization, emphasize on training and communication to improve
communication flow in the whole process (Silverman, 2013). Plan on how auditing will be
done and keep the enforcement consistent all along that will p...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags