See attached.Policy Writing Approach Refer to “Case Study: Policy Writing Approach” found on page 102 of your textbook and

See attached.

Policy Writing Approach

Refer to “Case Study: Policy Writing Approach” found on page 102 of your textbook and copied below.

Regional Bank has been growing rapidly. In the past two years, it has acquired six smaller financial institutions. The long-term strategic plan is for the bank to keep growing and to “go public” within the next three to five years. FDIC regulators have told management that they will not approve any additional acquisitions until the bank strengthens its information security program. The regulators commented that Regional Bank’s information security policy is confusing, lacking in structure, and filled with discrepancies.

You have been tasked with fixing the problems with the policy document. Write a two-page case study that includes the following sections.

· Introduction: Current Problem

· Discussion

· Where do you begin this project?

· Would you use any material from the original document?

· What other materials should you request?

· Would you want to interview the author of the original policy?

· Who else would you interview? Should the bank work toward ISO certification?

· Which ISO 27002:2022 domains and sections would you include?

· Should you use NIST’s Cybersecurity Framework (CIA security model) and related tools? If yes, explain why the tools selected are important to IS policy writing.

· Which methods of communication should you use to send the policy?

· What other criteria should you consider?

· Conclusion

· References

Your paper should include a title page and a reference page, which do not count toward the two-page minimum. Use APA

Course Textbook(s)

Santos, O. (2019). Developing cybersecurity programs and policies (3rd ed.). Pearson.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

CapstoneDesign and Analysis of a Simple Computer SystemObjective: Students will

Capstone Design and Analysis of a Simple Computer System Objective: Students will design, simulate, and analyze the architecture of a simplified computer system, applying concepts from Stephen D. Burd’s materials such as the CPU, memory hierarchy, I/O, and instruction set architecture (ISA). Components: 1. System Design: . CPU Design: Create

Please see attached detailsDAT 250 Project Two: Organizational Scenarios Scenario A: AmityTech Solutions (CCPA and GDPR) AmityTech Solutions is

Please see attached details DAT 250 Project Two: Organizational Scenarios Scenario A: AmityTech Solutions (CCPA and GDPR) AmityTech Solutions is a well-established technical management company based in North America, providing comprehensive data management services to businesses across various industries. AmityTech specializes in offering secure data solutions, robust server infrastructure management,

see attachment for detailsAs you have read Lesson 8: Identifying and Mitigating Accountability Risk in uCertify Certified Ethical Emerging

see attachment for details As you have read Lesson 8: Identifying and Mitigating Accountability Risk in uCertify Certified Ethical Emerging Technologist, consider an industry with ambiguous data privacy regulations. Responsibility Assignment Matrices (RACI) can build accountability and help safeguard data. Pick one of the following hypothetical scenarios where a company