RESPOND TO THESE DISCUSSION POST BASED ON THE TOPIC ??onsidering all you have learned, what do you see as the cultural, communication, and global challenges facing risk management and risk assessment? As an IT security manager, which of the risks that you identified concern you the most, and why???

In response to your peers, present and discuss each challenge they identified and provide references. In addition, provide mitigating solutions to the challenges you discussed. (TWO (2) PARAGRAPHS EACH WITH REFERENCES ON EACH OF THEM SEPARATELY, NOT TOGETHER)

1JstJns R.A.C
One of the most worrying issues facing risk management is one that I see as a cultural issue. More of an organizational culture issue really, it seems that many corporations still see their information security systems as being a secondary concern. Something that can be dealt with when a problem arises. This can be difficult for security managers because it means that many security measures are limited by budgets and yes, I realize that would be the case any way. But it seems many companies are fine with cutting corners until a large breach occurs. I think as more and more large-scale breaches occur companies will begin to invest more money into their security systems. Many are already beginning to do this but with the pace technology advances and how slowly a lot of companies are at adopting technology, it seems like a problem that we will be facing for years to come.

One of the biggest challenges is balancing the risk to the organization along with business operations. ?I have always looked a security as a balancing act between the security of a companies data along with the functionality of the business being able to use their data. ?As an IT Security Manager would could lock down all external communication from the internal network to the outside world but this would pose huge challenges to the business being able to communicate and work with outside entities. ?Security decisions should first look at the information that is housed within the organization and determine the impact to the business if this information was compromised. ?Data of sensitive nature should always be kept as secured as possible with limited expose to other systems or the outside world and these communication channels should be monitored and defined to prevent for unauthorized access. ?A security manager should work closely with business leaders to define a security strategy that can both be secure and allow the business to operate without inconvenience. ?One risk I deal with on a monthly basis with my organization is the patching of both business operating systems as well as third party applications. ?Many times OS and third party patching goes by the wayside to accommodate business needs causing my company to become exposed due to identified vulnerabilities that are addressed with these remediation patches.

Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points. ?You must discuss the topic using your own words first. ?Using your own words indicate you understand the topic of discussions. ?Secondly, you must cite your sources in-text. ?This is necessary to justify your points. Sources from several sources showed good research abilities. ?Lastly, you must provide references at the bottom of your post. ?A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this. ?You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.

www.citationmachine.net to format references into the APA style if necessary. Extremely important. Intext citations is very essential and highly needed as well.

use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements:2 PAPARAGRAPHS FOR EACH PROMPT ANSWER. Make sure you cite if you take a piece of someone?? work, very important and your reference should relate to your writing (don?? cite a reference because it relates to the course and not this very paper) at least 2 current and relevant academic references. No heavy paraphrasing of others work.

You may also like