Cybersecurity Program Maintenance | Report
Added on 2022-09-24
11 Pages1493 Words24 Views
Running head: CYBERSECURITY PROGRAM MAINTENANCE
Cybersecurity Program Maintenance
Name of the Student
Name of the University
Author’s Note
Cybersecurity Program Maintenance
Name of the Student
Name of the University
Author’s Note
1CYBERSECURITY PROGRAM MAINTENANCE
Table of Contents
Introduction......................................................................................................................................2
Actionable Plan................................................................................................................................2
Procedures for tracking performance...........................................................................................2
Procedures to measure and monitor performance.......................................................................3
Procedures to identify threats and vulnerabilities........................................................................4
Procedures for obtaining policy feedback...................................................................................5
Procedures and tools for monitoring external and internal environment....................................5
Procedures for budget allocation.................................................................................................6
Procedures to catch oversight......................................................................................................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................9
Table of Contents
Introduction......................................................................................................................................2
Actionable Plan................................................................................................................................2
Procedures for tracking performance...........................................................................................2
Procedures to measure and monitor performance.......................................................................3
Procedures to identify threats and vulnerabilities........................................................................4
Procedures for obtaining policy feedback...................................................................................5
Procedures and tools for monitoring external and internal environment....................................5
Procedures for budget allocation.................................................................................................6
Procedures to catch oversight......................................................................................................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................9
2CYBERSECURITY PROGRAM MAINTENANCE
Introduction
IT security is securing things that are valuable aspects of any organization. That usually
includes data, people and property, which is the assets of the organization. There are security
controls in order to reduce or minimize the damage to those properties. These involve any form
of program, process, strategy, system, approach, plan, operation, or tool designed for
helping accomplish that goal. This study aims to create and discuss the actionable plan, which
will include the budget allocation and executive support.
Actionable Plan
Procedures for tracking performance
Some basic methods of monitoring that management should use to gauge organizational
and employee performance are:
Performance Reviews
Standardized performance evaluation sheets will allow the managers to monitor over time
the success and improvement of workers toward organizational goals (Galbraith, 2014).
Multiple types provide spaces for staff to assess their own results in addition to management
reviews, which encourage the discussion between the stakeholders.
Peer Appraisals
Peers also have opinions on the success of their peers, which has driven some institutions
to conduct peer reviews. Appraisals may be monitored against multiple data over several
Introduction
IT security is securing things that are valuable aspects of any organization. That usually
includes data, people and property, which is the assets of the organization. There are security
controls in order to reduce or minimize the damage to those properties. These involve any form
of program, process, strategy, system, approach, plan, operation, or tool designed for
helping accomplish that goal. This study aims to create and discuss the actionable plan, which
will include the budget allocation and executive support.
Actionable Plan
Procedures for tracking performance
Some basic methods of monitoring that management should use to gauge organizational
and employee performance are:
Performance Reviews
Standardized performance evaluation sheets will allow the managers to monitor over time
the success and improvement of workers toward organizational goals (Galbraith, 2014).
Multiple types provide spaces for staff to assess their own results in addition to management
reviews, which encourage the discussion between the stakeholders.
Peer Appraisals
Peers also have opinions on the success of their peers, which has driven some institutions
to conduct peer reviews. Appraisals may be monitored against multiple data over several
3CYBERSECURITY PROGRAM MAINTENANCE
monitoring cycles, which help identify behavior trends which are favorable and unfavorable
patterns.
Dashboards
Multiple organizations use standardized dashboards to monitor the success of their
organizations or divisions. Dashboards may contain a number of measures based on the main
workflow dimensions or vital performance factors that a company needs to measure.
Customer Voice
Monitoring complaints from staffs is critical for quality control, which is why many
businesses are monitoring the client’s voice. Mechanisms for monitoring vary, but may include
the Excel spreadsheets or repositories intended to record service or product failures.
Procedures to measure and monitor performance
Evaluate Organizational Priorities
The first stage ensures that the tools dedicated to monitoring and evaluating success are
directed towards strategic corporate objectives and mission.
Choose Performance Measures
After the organization examines what is important to calculate, the next step will be to
choose different metrics of success (Harbour, 2017).
Determine the Baseline
Once success measures are selected, the reference data for the measures is gathered by an
organization.
monitoring cycles, which help identify behavior trends which are favorable and unfavorable
patterns.
Dashboards
Multiple organizations use standardized dashboards to monitor the success of their
organizations or divisions. Dashboards may contain a number of measures based on the main
workflow dimensions or vital performance factors that a company needs to measure.
Customer Voice
Monitoring complaints from staffs is critical for quality control, which is why many
businesses are monitoring the client’s voice. Mechanisms for monitoring vary, but may include
the Excel spreadsheets or repositories intended to record service or product failures.
Procedures to measure and monitor performance
Evaluate Organizational Priorities
The first stage ensures that the tools dedicated to monitoring and evaluating success are
directed towards strategic corporate objectives and mission.
Choose Performance Measures
After the organization examines what is important to calculate, the next step will be to
choose different metrics of success (Harbour, 2017).
Determine the Baseline
Once success measures are selected, the reference data for the measures is gathered by an
organization.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Cyberspace & Cybersecurity Foundationlg...
|15
|544
|34
Cyber Security Program Maintenance: Executive Level Supportlg...
|5
|718
|491
Monitoring and Controlling of International Project Managementlg...
|7
|1385
|253
EMPLOYEE PERFORMENCE MANAGEMENTlg...
|18
|1833
|12
Performance Management Processlg...
|9
|1925
|30
Performance Measurement & Metricslg...
|7
|1476
|83