200 word response due 5/17/2024Franco2a When recruiting employees for

200 word response due 5/17/2024

Franco

2a

When recruiting employees for cybersecurity focused work, the vetting process is very important. These prospective employees are more thoroughly vetted than in non-security positions because of the nature of the work. A cyber employee’s main objectives will be to strengthen the cybersecurity posture of an organization and to decrease asset loss in the case of a potential event. Since they will be protecting critical systems and sensitive data, employers will have to be certain that they have a clean background and intentions. They are the first line of defense and they cannot be corrupt. It would be like a commercial bank hiring a former bank robber as branch manager.

2b

The standard for most industries during the hiring process is to search up a candidate and if their social media platforms are generated in queries they have every right to peruse the profile. McCrie and Lee (2024) recalled that if someone’s information is posted voluntarily on the web, there is no expectation of privacy. Security and HR can check social media for public profiles to further vet a candidate. Invasion of privacy would start if the organization goes to an extreme measure of creating a profile on social media and trying to follow or access profiles that are private and do not show information on a search engine query. Vetting through social media can be a controversial topic because of the damaging conclusions a employer could draw.

2c

Ongoing training can be described as continuous training to ensure that personnel is informed of changes that occur in their respective field. When comparing ongoing training to In-service training, in-service training is usually a planned event where outside personnel train experienced employees in specialized issues or potential events (McCrie & Lee, 2024). 

Board of Directors should receive on-going training about changes in the security landscape and be informed of the new cybersecurity controls that can better secure critical assets. They should receive in-service training about social engineering techniques and how to not be manipulated by threat actors in their own workstations and email domains. Senior management should receive on-going training on how to manage people. They should receive in-service training on communication to be able to present ideas more effectively to shareholders on implementing better security controls. Chief Information Security Officers (CISO) should receive on-going training about soft skills and leading employees during stressful and critical times. They should receive specialized training on specific security controls and how to train employees how to use and implement these controls. IT management should receive on-going training on changing threats and hardware. Their in-service training should be focused on building after-breach reports and gathering effective data to further protect against future events. Functional area management should receive on-going training about different compliance laws and regulations. They should receive in-service training about social-engineering techniques because they may lack foundational security training. Information security personnel should receive on-going training on new software and other security controls. They should receive in-service training on physical security controls against threat actors. Lastly, end-users should receive ongoing training on company changes and procedures. Their in-service training should include phishing techniques and other scams to prevent company loss.

2d

Cybersecurity training is vital to help safely secure an organization’s critical assets. Bhaskar (2022) described that 52 percent of organizations biggest IT threats are non-security employees. They fall to scams like phishing and other social engineering dangers. Offering staff training can be more effective then implementing sophisticated software to combat threat actors. The costliest events are typically ones where threat actors impersonate CEO’s or senior management (Bhaskar, 2022). In addition, the most frequently employed method was impersonations of vendors and suppliers. Bhaskar (2022) further described that employees who received cybersecurity training demonstrate improved ability to recognize potential threats. Investing resources in security training can be the difference in potential events.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

  For this discussion, compare and contrast the characteristics of quantitative and qualitative research, addressing the philosophical assumptions of

  For this discussion, compare and contrast the characteristics of quantitative and qualitative research, addressing the philosophical assumptions of both. Based on your review of the assigned readings, identify and describe what you believe to be meaningful about the qualitative research design and methodology. Define and describe the context in

  this week, explore scholarly literature on critical success factors and project management success. Specifically, focus on complex projects and their

  this week, explore scholarly literature on critical success factors and project management success. Specifically, focus on complex projects and their success or failures, which may include tools, templates, processes, procedures, and metrics, and their relationship to the five process groups: initiating, planning, executing, monitoring and controlling, and closing. Post

IT 226 Project Two Guidelines and Rubric Competency In this project, you will demonstrate your mastery of the following competencies: ·

IT 226 Project Two Guidelines and Rubric Competency In this project, you will demonstrate your mastery of the following competencies: · Determine appropriate ways to communicate information to internal and external stakeholders · Apply communication techniques to effectively negotiate and manage conflict Scenario You are the manager of a team of 10 software developers working on a new application for your company, Optimum Way Development, which is based out of Raleigh, North Carolina. Your organization recently acquired a smaller software company based in San Jose, California. You have been informed that your team will be bringing on five people from this newly acquired company; all five people will be moving to Raleigh to join your team. You schedule a phone call with the five new team members and discover that they are upset about the recent impersonal message they received from human resources informing them that they would have to relocate to Raleigh in order to stay employed; no one expressed excitement about joining the team. During this conversation, you also discover that many of the new team members have more education and experience than the people currently on your team. Based on the conversation, you notice that most of these team members are likely older than you, whereas all of the current Raleigh team members are younger than you. After the call, one of your current senior team members approaches you about rumors that are circulating concerning the Raleigh team being required to train the new team members from San Jose. They heard that there are plans to eliminate positions and are concerned the new hires will ultimately be taking their positions. The director who oversees your division has requested that you create and present a recommendation report that documents your plans for managing the conflicts that currently exist or may arise on your team. The director has an advanced degree in a computer science-related field and has worked in technology for over a decade. Directions In order to identify and resolve existing and future conflicts, you have been asked to compose and present your plan for managing conflict for this project. In addition to identifying and resolving the conflicts, you are also responsible for keeping the development of the new application moving forward by continuing to meet scheduled milestones. To do this, you will create a recommendation report and corresponding presentation. The audience for both deliverables is your director. As you create your report and presentation, remember to  use communication techniques and platforms that are appropriate for your audience’s preferences and motivations. Both deliverables should be based on the above scenario and include the following: 1. To start,  explain the major elements of the software application, including background, audience, functions, and features. 2. Next,  explain the areas of conflict for the team. Make sure to include contributing factors and the possible impacts. 3. Articulate the desired outcome of any conflict resolution activities. · How would you like to see this conflict resolved? · What is the “best-case” scenario? 4. Recommend action steps for managing areas of possible conflict with a detailed explanation on how the action steps contribute to conflict resolution. 5. In the presentation only,  use dialogue to communicate the appropriate main ideas to the audience. Although you will not give this presentation over video, you should use the speaker’s notes section in PowerPoint to write the accompanying speech. What to Submit To complete this project, you must submit the following: Recommendation Report Your report should be at least 2 full pages in length (not including a title page), single-spaced and submitted as either a Word document or PDF. Outside resources are not required, but any resources used must be appropriately cited using APA style. You may use the  Recommendation Report Template Word Document for this submission. Presentation Your presentation should be in a presentation format (such as PowerPoint) and  provide an overview of the main ideas from the recommendation report. Using the speaker’s notes section of PowerPoint, include the speech that would accompany the presentation. Outside resources are not required, but any resources used must be appropriately cited using APA style. Supporting Materials The following resource(s) may help support your work on the project: Resource:  Software Design Documents Use one of these software design documents to summarize the application in your report and presentation. Shapiro Library Resource:  Shapiro Library APA Style Guide This Shapiro Library guide goes over the basics of APA-style formatting and citations.

STUDENT COVER SHEET-Student and Trainer/Trainer Details

STUDENT COVER SHEET- Student and Trainer/Trainer Details Student ID Student name Contact number Email address Trainer name Jason Chu Course and Unit Details Course code ICT50118/ICT60115 Course name Diploma/Advanced Diploma of IT Unit code ICTICT608 Unit name Interact with a client on a business level Assessment Title Assessment 1 –