logo

Cybersecurity Program Maintenance | Report

   

Added on  2022-09-24

11 Pages1493 Words24 Views
Running head: CYBERSECURITY PROGRAM MAINTENANCE
Cybersecurity Program Maintenance
Name of the Student
Name of the University
Author’s Note

1CYBERSECURITY PROGRAM MAINTENANCE
Table of Contents
Introduction......................................................................................................................................2
Actionable Plan................................................................................................................................2
Procedures for tracking performance...........................................................................................2
Procedures to measure and monitor performance.......................................................................3
Procedures to identify threats and vulnerabilities........................................................................4
Procedures for obtaining policy feedback...................................................................................5
Procedures and tools for monitoring external and internal environment....................................5
Procedures for budget allocation.................................................................................................6
Procedures to catch oversight......................................................................................................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................9

2CYBERSECURITY PROGRAM MAINTENANCE
Introduction
IT security is securing things that are valuable aspects of any organization. That usually
includes data, people and property, which is the assets of the organization. There are security
controls in order to reduce or minimize the damage to those properties. These involve any form
of program, process, strategy, system, approach, plan, operation, or tool designed for
helping accomplish that goal. This study aims to create and discuss the actionable plan, which
will include the budget allocation and executive support.
Actionable Plan
Procedures for tracking performance
Some basic methods of monitoring that management should use to gauge organizational
and employee performance are:
Performance Reviews
Standardized performance evaluation sheets will allow the managers to monitor over time
the success and improvement of workers toward organizational goals (Galbraith, 2014).
Multiple types provide spaces for staff to assess their own results in addition to management
reviews, which encourage the discussion between the stakeholders.
Peer Appraisals
Peers also have opinions on the success of their peers, which has driven some institutions
to conduct peer reviews. Appraisals may be monitored against multiple data over several

3CYBERSECURITY PROGRAM MAINTENANCE
monitoring cycles, which help identify behavior trends which are favorable and unfavorable
patterns.
Dashboards
Multiple organizations use standardized dashboards to monitor the success of their
organizations or divisions. Dashboards may contain a number of measures based on the main
workflow dimensions or vital performance factors that a company needs to measure.
Customer Voice
Monitoring complaints from staffs is critical for quality control, which is why many
businesses are monitoring the client’s voice. Mechanisms for monitoring vary, but may include
the Excel spreadsheets or repositories intended to record service or product failures.
Procedures to measure and monitor performance
Evaluate Organizational Priorities
The first stage ensures that the tools dedicated to monitoring and evaluating success are
directed towards strategic corporate objectives and mission.
Choose Performance Measures
After the organization examines what is important to calculate, the next step will be to
choose different metrics of success (Harbour, 2017).
Determine the Baseline
Once success measures are selected, the reference data for the measures is gathered by an
organization.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyberspace & Cybersecurity Foundation
|15
|544
|34

Cyber Security Program Maintenance: Executive Level Support
|5
|718
|491

Monitoring and Controlling of International Project Management
|7
|1385
|253

EMPLOYEE PERFORMENCE MANAGEMENT
|18
|1833
|12

Performance Management Process
|9
|1925
|30

Performance Measurement & Metrics
|7
|1476
|83