logo

Emergency Management Perspectives in Cyber Security

   

Added on  2023-04-23

10 Pages2231 Words432 Views
Professional Development
 | 
 | 
 | 
Running head: CYBER SECURITY 1
Emergency Management Perspectives in Cyber Security
Name (Student #)
University Name (EDMG 600)
Professor's Name
Date
Emergency Management Perspectives in Cyber Security_1

CYBER SECURITY 2
Emergency Management Perspectives in Cyber Security
It is quite evident that Cybersecurity has been an integral part of saving a business and its
information nowadays. Cybersecurity is most commonly associated with information technology
and its three aspects of people, process and technology. the introduction of Information and
Technology system within organizational processes have been considered as a supreme
advancement of business processes with the amalgamation of technology but this is also been
one of the huge problems that is impossible to control with the movement of data and the
effective processes (Bertino and Hartman, 2015). This is why the concerns about the
Cybersecurity problems have made it inevitable that every organization follows a set policy that
makes it easier for the organizations to set up a security risk management that would secure the
information generated within the organization. Therefore following would be a Cybersecurity /
EM policy analytical model generated to justify the most effective way of managing Emergency
Management related Cyber security issues at the state level and several security related issues
would be addressed from a provided case study.
Part 1:
Cybersecurity/EM Policy Analytical Model
. Reviewing the Cybersecurity landscape, it can be said that every organization needs to
develop a Cybersecurity or emergency management policy following a static analytical morning.
This would help the organization in gaining a proper framework of organizing the day to day
operations while at the same time protecting the integrity of the information generated within the
organization. Following would be a recommendation about few strategies for building successful
Emergency Management Perspectives in Cyber Security_2

CYBER SECURITY 3
programs with activities of CISO for setting up a Cybersecurity or emergency management
analytical model for the state level:
1. The increasing of using collaboration and network affiliated by the state Cyber
security officials: The chief information security officers should be responsible for managing the
Cybersecurity in parts. This means that only aspects of Cybersecurity should be segregated for
management. This would include identifying the Cyber security risks, mobilizing them,
advertising them in order of risk factor and helping the particular public sector knowledge
networks available to the Cyber security issues (Deloitte-NASCIO, 2013). All the chief
information security officers should recognize the factor that forms the base of all of these
networks which is to be developed and preserved for the improvement of interpersonal
relationships between the aspects of Cyber security management within the organization and
should not follow a command or control perspective. This particular policy should have key
activities enlisted, including, the Chief Information Security Officer and their networks Bee
family rooted for free exchange of information respecting the privacy of the information,
appropriateness as well as professionalism in the exchange of information, the policy should
focus on industrialization of the approaches working for different kinds of organization under
different state environment, the funding and building of acrostic interaction formed between the
chief information security officers through communication mechanisms of a varied kind and the
investment done for maintenance and development of the networks for achieving specific project
across states (Newsome and Jarmon, 2015).
2. The officials and responsibility of managing the Cybersecurity should make an
evaluation of the informal or formal relationship with the federal Cyber security officials: This
is to specify that the authority or status between the state Cyber security officials and federal
Emergency Management Perspectives in Cyber Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
How Department of Homeland Security Should Handle Cyber Threats to Protect the National Infrastructure
|4
|413
|481

Cybersecurity Risks and Recommendations for ABCT
|13
|3833
|55

Cyber Security Operation Management Risk
|8
|1789
|64

Cybersecurity and its Importance to ABCT
|5
|959
|422

Cybersecurity: Importance, Vulnerabilities, Emerging Threats, and Recommendations
|13
|3502
|179

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27