Summary ToDo List

.docx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

4640

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

9

Uploaded by lashee86 on coursehero.com

Unit 2 Strategy Learning Objective CISO and Developing a Security Strategy CISO and Emerging Technologies and Trends Concepts Four Ways Organizations Develop Cybersecurity Strategy Cybersecurity Strategy Development Framework Company Culture Government Regulations Reading Review the Required Readings assigned for this lesson from your textbook, CISO Compass, 1st edition: Chapter 2, “Strategy” Keywords Use the following keywords to search for additional materials to support your work: Cybersecurity Strategy Alignment Governance Controls Risk Management Physical security Privacy.
To-do list 1. Reading Assignment: Chapter 2 2. Review Lecture Notes and Slides: a. Course introduction. b. Chapter 2 - slides 3. Lecture/Discussion attendance: a. Attend Class Sessions (on-ground course) or weekly Seminar for online classes (see D2L calendar for date and time). Note for online courses, if you are unable to attend the seminar, you may submit two-page summary report of the week’s reading materials as a substitute for attendance without loss of points. 4. Complete Discussion Post: a. Introduce yourself in the discussion forum. Create a quality post of approximately 100 words and reply to at least 2 other student posts. 5. Complete Assignment & Assessments: a. Complete HW2 b. No lab c. Graduate students : complete graduate reading assignment. d. See assessment part of this document for specifics.
Learning Materials This is where class notes and other materials related to the lesson will be placed. Links to all audio, video, plug-in, Flash file, charts, diagrams, etc. for the unit are accessible from this page. Learning materials for each chapter should be reviewed after the readings. Chapter 2 Lecture slides: I Chapter 2, “Strategy Resources Unit 1 1. Isaac, M. 2012. Mark Zuckerberg on Facebook’s Early Days: Go Hard or Go Home All Things D (October 20).  http://allthingsd.com/20121020/mark-zuckerberg-on-facebooks-early-days-go- hard-or-go-home/ . 2. Gartner News Room. 2017. Gartner Forecasts Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent (December 17).  www.gartner.com/newsroom/id/3836563 . 3. Kennedy, B. and Funk, C. 2016. 28% of Americans are ‘Strong’ Early Adopters of Technology. Pew Research Center (July 12).  http://www.pewresearch.org/fact-tank/2016/07/12/28-of- americans-are-strong-early-adopters-of-technology/ . 4. Zwilling, M. 2014. Early Adopters Are Great, But They Aren’t Most Customers. Entrepreneur Europe (November 14).  www.entrepreneur.com/article/239606 . 5. Warren, T. 2016. Tesla has received almost 400,000 preorders for the Model 3. The Verge (April 21).  www.theverge.com/2016/4/21/11477034/tesla-model-3-preorders-400000-elon-musk . 6. Nelson, G. 2015. Tesla Meets Model S Production Goal, But Losses Widen Automotive News (February 11).  www.autonews.com/article/20150211/OEM/150219951/tesla-meets-model-s- production-goal-but-losses-widen . 7. Wisniewski, M. 2013. Mobile Check Deposit Boom Brings Risks. American Banker (July 11).  www.americanbanker.com/news/mobile-check-deposit-boom-brings-risks . 8. Gartner News Room. 2016. Gartner Says By 2020, a Corporate “No-Cloud” Policy Will Be as Rare as a “No-Internet” Policy Is Today (June 22).  www.gartner.com/newsroom/id/3354117 . 9. Mitchell, J. 2018. How Machine Learning and Other Tech Trends Will Disrupt Cyber Security In 2018.  Forbes  (January 31).  www.forbes.com/sites/julianmitchell/2018/01/31/how-machine- learning-and-other-tech-trends-will-disrupt-cyber-security-in-2018/#36c281948009 . 10. Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018. Security Intelligence (January 2).  https://securityintelligence.com/five-new-years-resolutions-to-help-cisos- improve-enterprise-security-in–2018/ . 11. Bitcoin USD.  https://finance.yahoo.com/chart/BTC-USD . 12. Cao, S. 2018. $500M of Digital Coins Stolen on Japan’s Largest Crypto Exchange.  Observer  (January 26).  http://observer.com/2018/01/500m-digital-coins-stolen-japans- largest-crypto-exchange/ . 13. Bitcoin. Securing Your Wallet.  https://bitcoin.org/en/secure-your-wallet . 14. Carmody, B. 2018. 7 Ways Blockchain Will Enable Entrepreneurs in 2018. Inc.  www.inc.com/bill- carmody/7-ways-blockchain-will-enable-entrepreneurs-in-2018.html . 15. Meola, A. 2016. Internet of Things in healthcare: Information Technology in Health. Business Insider.  www.businessinsider.com/internet-of-things-in-healthcare-2016-8 .
16. Gartner, Inc. 2016. Gartner Says By 2020, More Than Half of Major New Business Processes and Systems Will Incorporate Some Element of the Internet of Things. Gartner Newsroom (January 14).  www.gartner.com/newsroom/id/3185623 . 17. Shaban, H. 2018. Amazon is Issued Patent for Delivery Drones That can React to Screaming Voices, Flailing Arms. The Washington Post (March 22).  http://www.washingtonpost.com/news/the-switch/wp/2018/03/22/amazon-issued-patent-for- delivery-drones-that-can-react-to-screaming-flailing-arms/?utm_term=.dea0a56797b5 . 18. Frank, M. 2016. Drone Privacy: Is Anyone in Charge? Consumer Reports (February 10).  http://www.consumerreports.org/electronics/drone-privacy-is-anyone-in-charge/ . 19. National Conference of State Legislatures. 2018. Current Unmanned Aircraft State Law Landscape. Blog (February 1).  www.ncsl.org/research/transportation/current-unmanned-aircraft-state-law- landscape.aspx . 20. Howell O’Neill, P. 2017. Ransomware is Now a $2 Billion-Per-Year Criminal Industry. Cyberscoop (November 21).  http://www.cyberscoop.com/ransomware-2-billion-bitdefender-gpu- encryption/ . 21. Europol. 2017. 2017, The Year When Cybercrime Hit Close to Home. (November 27).  www.europol.europa.eu/newsroom/news/2017-year-when-cybercrime-hit-close-to-home . 22. Department Health and Human Services. Fact Sheet: Ransomware and HIPAA.  www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf . 23. Los Angeles Times. 2011. Watson Wins ‘Jeopardy!’ Finale; Ken Jennings Welcomes ‘Our New Computer Overlords’. (February 16).  http://latimesblogs.latimes.com/showtracker/2011/02/watson- jeopardy-finale-man-vs-machine-showdown.html . 24. Government Publishing Office. 1998. 63 FR 41804- Presidential Decision Directive 63 on Critical Infrastructure Protection: Sector Coordinators. Federal Register Volume 63, Issue 150. (August 5).  www.gpo.gov/fdsys/granule/FR-1998-08-05/98-20865 . 25. U.S. Department of Homeland Security. 2015. Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection. 1st Ed Dec 17, 2003, last published September 22, 2015.  www.dhs.gov/homeland-security-presidential-directive-7 . 26. Reuters. 2016. SWIFT Tells Banks to Share Information on Hacks. (May 20).  www.cnbc.com/2016/05/20/swift-tells-banks-to-share-information-on-hacks.html . 27. Swift. Customer Security Programme.  www.swift.com/myswift/customer-security-programme- csp/programme-description . 28. Swift. 2018. Fraud and Cyber High Alert. (March 19).  www.swift.com/news-events/news/fraud- and-cyber-high-alert . 29. The ThreatHunting Project.  http://www.threathunting.net/ . 30. MacDonald, N. 2017. 10 Things to Get Right for Successful DevSecOps. Gartner. October 3.  www.gartner.com/doc/3811369/-things-right-successful-devsecops . 31. Granville, K. Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens. New York Times (March 19).  www.nytimes.com/2018/03/19/technology/facebook-cambridge- analytica-explained.html . 32. Columbus, L. 2017. 2017 State of Cloud Adoption and Security. Forbes (April 23).  www.forbes.com/sites/louiscolumbus/2017/04/23/2017-state-of-cloud-adoption-and-security/ #7c032bd21848 . 33. Goodman, M. 2015.  Future Crimes . New York. Doubleday/Random House. Unit 2 1. Kaplan, J., Sharma, S., and Weinberg, A. 2011.  Meeting the Cybersecurity Challenge . McKinsey & Co (June 2011).  www.mckinsey.com/business-functions/digital-mckinsey/our-insights/meeting- the-cybersecurity-challenge . 2. Collins, J. 2001.  Good to Great: Why Some Companies Make the Leap and Others Don’t . New York. HarperCollins Publishers Inc.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help