Cyber-security & Security Audit | Assignment

Added on - 22 Sep 2019

  • 7

    Pages

  • 1626

    Words

  • 160

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 7 pages
Newark Memorial HospitalCybersecurity and Security AuditJean ZahoreNMHProject Management SponsorDemetrius JenkinsNMHProject ManagerAlbertBrinkleyNMHSecurity AnalystDavid ThompsonAHASr. Cybersecurity DeveloperEartha RobinsonAHASr. Application Security DeveloperEberardo GonzalezAHASr. IT Security Solutions DeveloperDaniel MeadeAHASr. Java Developer - Back End / DB Security teamAlbie MorkelAHASr. Network Security Design EngineerMorne SmithAHASr. Cybersecurity TesterAndrew DaviesAHASecurity Assessor/TesterMarni WandelAHAUserNeil PatelAHANetwork Security AnalystKurt WilsonAHAAccountant
Project Sponsor Role – Jean ZahoreSenior member of theprojectboard and often the chair whogovernsthe project riskKey stakeholder of the projectHelps with funding, scope clarification, and progress monitoring. Provides Influence toothers in order to benefit the projectLeads the project through the engagement/selection process till it is formally authorizedand therefore plays a dominant role in the development of the initial scope and charterIssues beyond the control of the project manager, thesponsorserves as an escalation pathAuthorizes changes in scope, phase-end reviews, and go/no-go decisions when risks areparticularly highFor internal projects, the project sponsor provides the statement of work based on businessneeds, product, or service requirementsIn the early stages of the project life cycle, periodic review of the business case by thesponsor helps to confirm that requirement of the project is still valid in current situationThe Sponsor acceptance required during the close of project and it should be documentedas part of the project closure phaseProject Manager Role – Demetrius JenkinsHas the overall responsibility for the successful initiation, planning, design, execution,monitoring, controlling and closure of aproject.Manage the Project!Identifying, monitoring, and responding to riskAccomplish the project objectives within the constraints of the project. He/she isresponsible for the outcome (success or failure) of the projectInvolved with the planning, controlling and monitoring and also managing and directing theassigned project resources to best meet project objectivesControls and monitors “triple constraints”—project scope, time and cost (quality also)—inmanaging competing project requirementsExamines the organizational culture and determine whether project management isrecognized as a valid role with accountability and authority for managing the project.Collects metrics data (such as baseline, actual values for costs, schedule, work in progress,and work completed) & reports on project progress and other project specific informationto stakeholdersMeet with project stakeholders for delivering a project’s objectives within scope, schedule,cost, and quality
Security Analyst Role – Albert BrinkleyProtects computer assets by establishing and enforcing system access controls; maintainingdisaster preparedness:Conduct internal and external security auditsAssist in planning, implementing and upgrading security measures and controlsMaintain data and monitor security accessPerform vulnerability testing, risk analyses and security assessmentsAnticipate security alerts, incidents and disasters and reduce their likelihoodManage network, intrusion detection and prevention systemsAnalyze security breaches to determine their root causeRecommend and install appropriate tools and countermeasuresDefine, implement and maintain corporate security policiesSr. Cybersecurity Developer – David ThompsonWorks with development and network engineers to architect and implement the nextgeneration security systems and defense strategies for highly available services infrastructure.Researches methods to compromise systems and security to develop strategies and designsto prevent intrusionMaintains security architectures with development and network engineers throughmonitoring, provisioning and review of cyber security system operationsProvides recommendation to management for security strategies to enforce policies andprotection of sensitive data and systems.Designs security infrastructure solutions to meet current and future application systems andservices
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document