See attached.Policy Writing Approach Refer to “Case Study: Policy Writing Approach” found on page 102 of your textbook and

See attached.

Policy Writing Approach

Refer to “Case Study: Policy Writing Approach” found on page 102 of your textbook and copied below.

Regional Bank has been growing rapidly. In the past two years, it has acquired six smaller financial institutions. The long-term strategic plan is for the bank to keep growing and to “go public” within the next three to five years. FDIC regulators have told management that they will not approve any additional acquisitions until the bank strengthens its information security program. The regulators commented that Regional Bank’s information security policy is confusing, lacking in structure, and filled with discrepancies.

You have been tasked with fixing the problems with the policy document. Write a two-page case study that includes the following sections.

· Introduction: Current Problem

· Discussion

· Where do you begin this project?

· Would you use any material from the original document?

· What other materials should you request?

· Would you want to interview the author of the original policy?

· Who else would you interview? Should the bank work toward ISO certification?

· Which ISO 27002:2022 domains and sections would you include?

· Should you use NIST’s Cybersecurity Framework (CIA security model) and related tools? If yes, explain why the tools selected are important to IS policy writing.

· Which methods of communication should you use to send the policy?

· What other criteria should you consider?

· Conclusion

· References

Your paper should include a title page and a reference page, which do not count toward the two-page minimum. Use APA

Course Textbook(s)

Santos, O. (2019). Developing cybersecurity programs and policies (3rd ed.). Pearson.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

100 word response 1 reference due 6/22/2024Emmons Discussion 3-3:

100 word response 1 reference due 6/22/2024 Emmons Discussion 3-3: Compliance within the Remote Access Domain What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy?  What risks, threats, and vulnerabilities are introduced by implementing a remote

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 a

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 and was enacted to assist reform the financial industry and address consumer financial privacy concerns (Federal Trade Commission, 2023). GLBA possesses requirements for the Federal Trade Commission and

200 word response 1 reference Due 6/8/2024JacksonDiscussion 2-2: Conducting an IT

200 word response 1 reference Due 6/8/2024 Jackson Discussion 2-2: Conducting an IT Infrastructure Audit for Compliance IT security policies have a high level of importance for a compliance audit. As defined by Fortinet, and IT Security Policy “identifies the rules and procedures for all individuals and using an organization’s