Question

In: Computer Science

A chief information security officer is creating a security committee involving multiple business units of a...

A chief information security officer is creating a security committee involving multiple business units of a corporation. Which of the following is the best justification to ensure collaboration across business units?

  1. A risk to business unit is a risk avoided by all business units, and liberal BYOD policies create new unexpected avenues for attackers to exploit Enterprises

  2. single point of coordination is required to ensure cyber-security issues are addressed in protected, compartmentalize groups

  3. without business unit collaboration, introduced by one unit that affect another unit may go without compensating controls

  4. ciso is uniquely positioned to control the flow of vulnerability information between business units

Solutions

Expert Solution

The correct answer is (c)

If a security committee involving multiple business units of the corporation is created, then the best justification to ensure collaborations across business units is (c) as it totally explains why it is important to ensure collaborations across business units.

It would help reduce risk by increasing security and would maintain a balance of compensation within all the units of a corporation.


Related Solutions

The board of executives decides on creating a new position as chief security officer, however, they...
The board of executives decides on creating a new position as chief security officer, however, they are not sure if the new position should be part of it department and report to the chief It officer or the new CSO should be the same level to CIO and directly report to the board. What would be your recommendation as a security consultant and why?
Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A....
Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A. The Chief Financial Officer (CFO) calls you wondering what should have been done differently during a recent incident involving your predecessor. The following incidents recently occurred and were closed out without any alert to senior staff or the CFO. The Chief Financial Officer’s admin reported that their laptops were performing erratically and many popup screens kept appearing while browsing the Internet. Upon inspection, it...
During an onsite visit with the Chief Information Security Officer (CISO), he tells you how upset...
During an onsite visit with the Chief Information Security Officer (CISO), he tells you how upset he is that they found Telnet in use by their network administrators. The reason was that the version of the router and switch operating system currently in use does not support security protocols. You assure the CISO that the upgrade will resolve that problem among other weaknesses he might be unaware of. you will act as the network administrator. Suggest some other network security...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for contingency planning include: A Recovery Time Objective (RTO) of 4 hours A...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for contingency planning include: A Recovery Time Objective (RTO) of 4 hours A...
A Chief Security Officer (CSO) has been unsuccessful in attempts to access the website for a...
A Chief Security Officer (CSO) has been unsuccessful in attempts to access the website for a potential partner (www.example.net). Which of the following rules is preventing the CSO from accessing the site? Blocked sites: *.nonews.com, *.rumorhasit.net, *.mars? Rule 1: deny from inside to outside source any destination any service smtp Rule 2: deny from inside to outside source any destination any service ping Rule 3: deny from inside to outside source any destination {blocked sites} service http-https Rule 4: deny...
The IT leader of a corporation is often referred to as the Chief Information Officer (CIO)....
The IT leader of a corporation is often referred to as the Chief Information Officer (CIO). This position may be a member of the executive leadership of the company, often a director or officer. Describe the Corporate Fiduciary Duties and Responsibilities of Directors and Officers. Does, in your opinion, the CIO perform a major role in running today’s modern companies? (150+ words, please and thank you)
The Chief Information Officer wants to ensure they are investing properly in information assurance. What are...
The Chief Information Officer wants to ensure they are investing properly in information assurance. What are some metrics should the Chief Information Security Officer advise the organization monitor? How would these metrics help to identify the cost / benefits, or the return on investment?. What are some caveats that might exist to the metrics you suggest? ( the course is called cybersecurity management)
You are the Chief Information Officer for General Manufacturing Incorporated. They are the leading supplier of...
You are the Chief Information Officer for General Manufacturing Incorporated. They are the leading supplier of plastic containers for consumer and commercial use. Fifteen years ago, they went live with an ERP system. Since that time, they have outgrown the system and it has become clear that they need a new one. Additionally, they have not sold their products directly to the public online but provided them to other industry users or to retail chains. They want to change so...
Demonstrated experience as a Chief Information Officer and with planning, programming, budgeting, and executing information technology...
Demonstrated experience as a Chief Information Officer and with planning, programming, budgeting, and executing information technology budgets.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT