Project Management: Security Awareness, Identity and Access Management, Enterprise Technology Security Program, Business Continuity Program

Verified

Added on  2023/04/23

|7
|1790
|110
AI Summary
This document discusses the initiatives of security awareness, identity and access management, enterprise technology security program, and business continuity program in project management. It includes interview questions, artefacts, and references.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Project Management

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
Initiative 7: Security Awareness for employees and group leaders...........................................2
Interview question 1:..............................................................................................................2
Interview question 2...............................................................................................................2
Interview question 3:..............................................................................................................2
Artefacts.................................................................................................................................2
Initiative 8: Identity and Access management...........................................................................2
Interview question 1:..............................................................................................................2
Interview question 2...............................................................................................................3
Interview question 3:..............................................................................................................3
Artefacts.................................................................................................................................3
Initiative 9: Office of the enterprise technology security program............................................3
Interview question 1:..............................................................................................................3
Interview question 2...............................................................................................................3
Interview question 3:..............................................................................................................4
Artefacts.................................................................................................................................4
Initiative 10: Enterprise business continuity program...............................................................4
Interview question 1:..............................................................................................................4
Interview question 2...............................................................................................................4
Interview question 3:..............................................................................................................4
Artefacts.................................................................................................................................5
References..................................................................................................................................5
Document Page
Initiative 7: Security Awareness for employees and group leaders
Interview question 1:
Which leadership style will be adopted by the project manager in dealing with employees?
The research question helps in identifying the impact of leadership style on the employees
working. Democratic style of leadership should be adopted by the project manager because it
will initiate the employee participation to its fullest and helps in keeping the positive
motivation with the working team members. The NIST CSF framework can be effectively
designed by analysing the requirement of the team members and security credentials of the
working environment. The success of the project can be accessed by enhancing the
operational capability of the working staff members.
Interview question 2
What strategic plan will the project manager adopt to handle the grievances of the
employees?
This research question helps in identifying the grievance handling procedure so that the
positive motivated employees give their best in developing highly secured NIST CSF
Framework to minimize the arrival of vulnerabilities. The grievance handling program should
be designed for the employees so that they can manage their grievances and helps in
minimizing the chaos and conflicts. The steps designed for handling the grievances are:
Defining and describing the grievances
Collecting relevant facts and figures for identifying the reasons for grievances
Developing tentative solution for minimizing the chaotic environment
Checking validity and verification of the tentative solutions
Implementation of the schedule
Taking follow-up
Interview question 3:
What step you will take to give knowledge about the project baseline to the employees?
The research question helps in specifying the goals and timeline of the project clearly to the
working employees. The project schedule should be prepared for defining the sequence of
project activities to NIST CSF enterprise security program. The allocation of resources and
division of role and responsibilities helps in managing the work distribution. The systematic
approach of managing meetings with the employees should be arranged so that the clear and
concise knowledge of project goal and their dedicated duties and responsibilities should be
clearly defined so that no chaos and conflict occurs in the development of the project plan.
Document Page
Artefacts
Collecting historical evidences for project planning
Identifying operational capabilities of the team members
Distribution of role and responsibilities among team members
Initiative 8: Identity and Access management
Interview question 1:
What strategy should be developed for ensuring the identity and access management for
preparing the enterprise security program?
The research question helps in ensuring the identity and access management for preparing the
enterprise NIST CSF security program. The identity of the user should be measured so that
the operational capabilities of the employees can be identified. The accessing of the
information and allocation of the required resources helps in increasing the operational
framework of the working staff (Mansfield community, 2013). The automation in the
business staff can be effectively done by providing new invented tools and technologies. The
division of role and power of authorisation and authentication helps in increasing the
efficiency of the access management policies because it helps in the validation of the work
flow and generation of authenticated reports.
Interview question 2
How the resources can be timely provided to the construction site?
The research question focuses on identifying the resource management program for handling
the NIST CSF security program. The service level agreement should be signed with the
contractor and sub-contractor to manage the supply and demand of the resources on the
construction site. The legal documentation helps in managing the resources on time. The
terms and conditions should be clearly mentioned in the agreement. The agreement focuses
on developing the communication strategic plan, risks management plan, and scope of work
(Monnappa, 2017). The issues and conflict in providing quality of raw material, on-time
delivery of resources on site location, division of responsibilities can be resolved by
preparing the legal documentation between the client and contractor company.
Interview question 3:
How the project cost can be minimized?
The research question focuses on identifying the project cost which can be minimized by
managing the allocation of resources between the employees. It helps in reducing the wastage
of resources which directly impact the cost and budget of the project. The centralization and
streamlining of the processes helps in minimizing the project cost because it helps in
enhancing the working efficiency of the team members (Passenheim, 2015). The NIST CSF
security program should be effectively developed.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Artefacts
Develops the service level agreement
Meeting conducted for specification of terms and condition
Developing resource requirement and allocation
Initiative 9: Office of the enterprise technology security program
Interview question 1:
How the requirement and gaps in the existing security program of the enterprise?
The research question helps in identifying the requirement and gaps in the existing security
program of the enterprise. The meetings, interview, and questionnaire should be arranged
with the focused staff members so that the gaps in the existing security program can be
identified. The market analysis should be organized so that the innovative technology and
marketing trends can be investigated effectively. The NIST CSF framework critical factors
and new security paradigm can be developed according to the newly invented viruses and
malware attacks. The regulatory requirement of the business should be identified so that the
robust processes can be developed (Wilson, 2012).
Interview question 2
How the confidentiality and security of the data can be managed?
The research question focuses on identifying the diligence security procedures should be
developed for managing the asset distribution of the NIST CSF Framework so that the
confidentiality, accuracy, reliability, and integrity of the data can be managed. The baseline
of the corrective action plan should be determined. The preventive procedures should be
developed for minimizing the impact of vulnerabilities on the information security
procedures.
Interview question 3:
What are the security standards should be developed for keeping the privacy of the
information?
The research question identifies the reliability of the information can be handled by defining
the requirement and gaps in the existing process and program, developing encryption
procedures, managing confidentiality, integrity, privacy, and accuracy of the information.
The focus should be given on identifying the risks at an early state of the project so that
efficient risks management strategy can be developed. The root cause of the project existing
NIST CSF framework is identified for enhancing the operational plan of the enterprise.
Document Page
Artefacts
Identifying Gaps and obscure in the project processes
Identifying impact of vulnerabilities on the operating procedures
Defining encryption and cryptographic procedures
Initiative 10: Enterprise business continuity program
Interview question 1:
How the political and legal issues with the government can be resolved?
The research question helps in identifying the political and legal issues with the government.
The good and friendly relationship should be developed with the government so that the legal
formalities associated with the enterprise security program can be resolved in the first
meeting. The interception of the political parties can be minimized by developing the
disruption associated with the government services and facilities. The recovery management
program for NIST CSF framework should be developed by setting priority to the legal and
political issues associated with the continuity program of the enterprise.
Interview question 2
How the critical services and activities can be handled to increase the efficiency of the
continuity program?
The research question focuses on identifying the critical services and activities which are
associated with the NIST CSF framework. The priority should be set to the project activities
so that the critical activities can be handled and completed at top priority so that the delay in
the project schedule can be minimized. The allocation of resources and cost according to the
requirement of the project helps in managing the critical activities with ease (Kharaiweish,
2013).
Interview question 3:
What are the activities for business continuity program and disaster recovery program?
The research question focuses on developing the business continuity program which is
comprised of identifying the goals and objectives of the enterprise, developing policies and
strategic plan, organizing risks identification and mitigation program, developing validation
and verification procedures, and organizing recovery process program. The disaster recovery
program for NIST CSF framework is comprised keeping the backup support of office data
and information so that the data can be easily retrieved if in case disaster will be occurred
which directly affects the infrastructure of the project. The dependencies of the activities and
events should be identified so that the priority of completing the activities can be allocated. It
helps in minimizing the critical path of the activities undertaken in the project schedule.
Artefacts
Checking the backup support of data and information
Document Page
Updating backup database periodically
Identifying dependencies and critical path of the project activities
References
Kharaiweish, M. (2013). Project Monitoring and control measures. International Journal of
computer science and information technology, 5(5). Retrieved from:
http://airccse.org/journal/jcsit/5513ijcsit03.pdf
Mansfield Community. (2013). Introduction to project management. 1st ed. Retrieved from
http://www.mansfield.vic.gov.au/Libraries/Community_Development/Intro_to_Projec
t_Management_Manual.sflb.ashx
Monnappa. (2017). Project scope management: What it is and why it is important. 1st ed.
Retrieved from https://www.simplilearn.com/project-scope-management-importance-
rar89-article
Passenheim, O. (2015). Project Management. 1st ed. Retrieved from
http://home.hit.no/~hansha/documents/theses/projectmanagement.pdf
Wilson, D. (2012). Project Governance. Retrieved from
http://www.masterresearch.com.au/downloads/pdfs/Project_Governance_V2.pdf
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]