logo

Information System Management and Strategy

   

Added on  2023-06-03

10 Pages2338 Words98 Views
Leadership ManagementMaterials Science and EngineeringPolitical Science
 | 
 | 
 | 
Running head: INFORMATION SYSTEM MANAGEMENT
Information system management and Strategy
Name of Student:
Name of College:
Authors Note:
1
Information System Management and Strategy_1

INFORMATION SYSTEM MANAGEMENT
Contents
Topic 1.............................................................................................................................................2
Topic 2.............................................................................................................................................3
Topic 3.............................................................................................................................................5
References........................................................................................................................................7
2
Information System Management and Strategy_2

INFORMATION SYSTEM MANAGEMENT
Topic 1
It is very important for the board of directors of VSpace Tours of having a dedicated Information
Security Program Manager Position in the organization as it is alone not possible for the Chief
Information Security Officer of the company to handle all security related operations of the
company. As opined by Hwang and Choi (2017) the Information Security Program Manager will
assist the Chief Information Security Manager regarding the management of all information
system security of the company. The Information Security Program Manager of the company
will serve as the expert on cybersecurity protection, detection, response and recovery.
As stated by Cao and Pan (2014) the Information Security Program Manager of the company
will be expected to play the role of a technical security manager in the organization who will be
typically in charge of the system and the teams who manages those systems. The Information
Security Program Manager will be entrusted with the responsibility of looking after the firewall,
data leakage protection system, encryption, vulnerability, data leakage protection system,
international business system and pen testing.
According to Muhammad Siddique Ansari (2016) the Information Security Program Manager
will be also playing the role of a program security manager who will be responsible for
evaluation of risks associated with various vendors, analysing the contracts of the vendors,
analysing the terms of service of various vendors, helping various teams of the company to
understand the risks which are associated with third party and helping them understand the
importance of data privacy in the absence of the Chief Information Security Officer.
As stated by Cecez-Kecmanovic, Kautz and Abrahall (2014) it is very important from the point
of view of the company to have a dedicated Information Security Program Manager who will
responsible in monitoring internal and external policy compliance in the company so as to ensure
that both the vendors and the employees of the company are working within the framework of a
policy which was agreed upon. The Information Security Program Manager will be responsible
for monitoring regulation compliance as it is very important for the company to ensure that they
follow all the regulatory frameworks in a regulated business environment.
3
Information System Management and Strategy_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Requirement Development Assignment
|10
|2188
|270

Security Operation Centre
|8
|1638
|146

ISM | Cyber Security Importance for University
|17
|2844
|25

Business Continuity and Incident Response
|17
|1016
|208

SAP-assigning Roles and Responsibilities
|9
|1877
|16

Role and Importance of Risk Register for University's Digital Security
|13
|3003
|227