Case Study
Case Study 1: Why should businesses invest in cybersecurity?
Case Scenario:
A client company has asked your cybersecurity consulting firm to provide it with a 2 to 3 page white paper which discusses the business need for investments in cybersecurity. The purpose of this white paper is to “fill in the gaps” in a business case that was already prepared by the company’s Chief Information Officer. The target audience for your paper is the company’s C-suite executives. These executives will be meeting later this month to discuss budget requests from department heads. The company has requested that your white paper use the same investment categories as are already in use for the CIO’s business case: people, processes, and technologies.
Research:
- Read / Review the Week 1 readings.
- Find three or more additional sources that provide information about ethics as applied to investments in cybersecurity. Suggested sources include:
- http://insights.ethisphere.com/the-power-of-information-and-business-of-ethical-responsibility/
- https://www.scu.edu/ethics/focus-areas/business-ethics/resources/cyber-security-and-the-obligations-of-companies/
- https://www.americanbar.org/content/dam/aba/events/labor_law/2015/march/tech/wu_cybersecurity.authcheckdam.pdf
- Find three or more additional sources that provide information about best practice recommendations for investing in people, processes, and technologies related to cybersecurity. These additional sources can include analyst reports (e.g. Gartner, Forrester, Price-Waterhouse, Booz-Allen) and/or news stories about recent attacks / threats, data breaches, cybercrime, cyber terrorism, etc.
Write:
Write a two to three page summary of your research. At a minimum, your summary must include the following:
1.An introduction or overview of cybersecurity which provides definitions and addresses the business need for cybersecurity. This introduction should be suitable for an executive audience.
2.A separate section in which you address ethical considerations that drive the business need for investments in cybersecurity.
3.A separate section in which you provide best-practice based recommendations for additions to the client’s business case. These recommendations should be designed to strengthen the justification for cybersecurity-focused investments and must separately address each of the three investment categories: people, processes, and technologies.
- A closing section in which you summarize your recommendations for additions and changes to the business case.
Your white paper should use standard terms and definitions for cybersecurity. See https://www.isaca.org/pages/glossary.aspx for acceptable terms and definitions.
1.You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy.
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


