Newark Memorial HospitalCybersecurity and Security AuditJean ZahoreNMHProject Management SponsorDemetrius JenkinsNMHProject ManagerAlbertBrinkleyNMHSecurity AnalystDavid ThompsonAHASr. Cybersecurity DeveloperEartha RobinsonAHASr. Application Security DeveloperEberardo GonzalezAHASr. IT Security Solutions DeveloperDaniel MeadeAHASr. Java Developer - Back End / DB Security teamAlbie MorkelAHASr. Network Security Design EngineerMorne SmithAHASr. Cybersecurity TesterAndrew DaviesAHASecurity Assessor/TesterMarni WandelAHAUserNeil PatelAHANetwork Security AnalystKurt WilsonAHAAccountant
Project Sponsor Role – Jean ZahoreSenior member of the project board and often the chair who governs the project riskKey stakeholder of the project Helps with funding, scope clarification, and progress monitoring. Provides Influence to others in order to benefit the projectLeads the project through the engagement/selection process till it is formally authorized and therefore plays a dominant role in the development of the initial scope and charterIssues beyond the control of the project manager, the sponsor serves as an escalation pathAuthorizes changes in scope, phase-end reviews, and go/no-go decisions when risks are particularly highFor internal projects, the project sponsor provides the statement of work based on businessneeds, product, or service requirementsIn the early stages of the project life cycle, periodic review of the business case by the sponsor helps to confirm that requirement of the project is still valid in current situationThe Sponsor acceptance required during the close of project and it should be documented as part of the project closure phaseProject Manager Role – Demetrius JenkinsHas the overall responsibility for the successful initiation, planning, design, execution, monitoring, controlling and closure of a project.Manage the Project!Identifying, monitoring, and responding to riskAccomplish the project objectives within the constraints of the project. He/she is responsible for the outcome (success or failure) of the projectInvolved with the planning, controlling and monitoring and also managing and directing the assigned project resources to best meet project objectivesControls and monitors “triple constraints”—project scope, time and cost (quality also)—in managing competing project requirementsExamines the organizational culture and determine whether project management is recognized as a valid role with accountability and authority for managing the project.Collects metrics data (such as baseline, actual values for costs, schedule, work in progress, and work completed) & reports on project progress and other project specific information to stakeholdersMeet with project stakeholders for delivering a project’s objectives within scope, schedule, cost, and quality
Security Analyst Role – Albert BrinkleyProtects computer assets by establishing and enforcing system access controls; maintaining disaster preparedness:Conduct internal and external security auditsAssist in planning, implementing and upgrading security measures and controlsMaintain data and monitor security accessPerform vulnerability testing, risk analyses and security assessmentsAnticipate security alerts, incidents and disasters and reduce their likelihoodManage network, intrusion detection and prevention systemsAnalyze security breaches to determine their root causeRecommend and install appropriate tools and countermeasuresDefine, implement and maintain corporate security policiesSr. Cybersecurity Developer – David ThompsonWorks with development and network engineers to architect and implement the next generation security systems and defense strategies for highly available services infrastructure. Researches methods to compromise systems and security to develop strategies and designs to prevent intrusionMaintains security architectures with development and network engineers through monitoring, provisioning and review of cyber security system operationsProvides recommendation to management for security strategies to enforce policies and protection of sensitive data and systems. Designs security infrastructure solutions to meet current and future application systems andservices
Found this document preview useful?
Human Resource Management Plan for Cybersecurity/HIPAA Security Audit at Newark Memorial Hospitallg...