Get your essays here, 10,000 to choose from!

Limited Time Offer at MyTermPapers!!!

Information Security - SDLC

9 Pages 2276 Words October 2017

y and strives to create efficiency in the processing and access of the organization’s information.[ CITATION Whi16 l 1033 ] Gladys is primarily responsible for advising the CEO on strategic planning that affects the management of information in the organization. She also translates the strategic plans of the organization as a whole into strategic information plans for the information systems or data processing division of the organization. Once this is accomplished, Gladys will work with subordinate managers to develop tactical and operational plans for the division and to enable planning and management of the systems that support the organization. I believe her success will be evaluated by her ability to lead, keeping the plan on track with time management, and successfully sticking to the proposed budget.
Charlie Moody has been brought on as SLS’s Chief Information Security Officer (CISO), which is typically considered the top information security officer in an organization. The CISO is usually not an executive-level position, and frequently the person in this role reports to the CIO. The CISO may also be referred to as the manager for IT security, the security administrator, or by a similar title. [ CITATION Whi16 l 1033 ] The CISO usually reports directly to the CIO, although in larger organizations, one or more layers of management might exist between the two. However, the recommendations of the CISO to the CIO must be given equal if not greater priority than other technology and information-related proposals. Charlie has the primary responsibility for the assessment, management, and implementation of information security with the company. His success should be measured by his ability to implement the new plan, reporting the team’s progress and the overall success of the new system.
Each perceived scope of the security effort varies per individual. As the CEO, Fred originally may have had more of a concern about the fina...

< Prev Page 2 of 9 Next >

Essays related to Information Security - SDLC

Loading...