Download presentation
Presentation is loading. Please wait.
Published byPierce Baldwin Modified over 9 years ago
1
Concept Presentation Philip Robbins - August 1, 2012 University of Phoenix Hawaii Campus Information Systems Security Management
2
Who am I? Information Systems Authorizing Official Representative -United States Pacific Command (USPACOM) -Risk Management Field -Assessments to USPACOM Authorizing Official / CIO Bachelor of Science in Electrical Engineering Master of Science in Information Systems Ph.D. Student in Communication & Information Sciences Certified Information Systems Security Professional (CISSP) and Project Management Professional (PMP)
3
Concept 1: Info Security & Assurance You leave your job at ACME, Inc. to become the new Information Systems Security Manager (ISSM) for University of University College (UUC). The CIO of UUC drops by your office to let you know that they have no ISS program at UUC! A meeting with the Board of Directors is scheduled and you are asked by the CIO to attend. The Board wants to hear your considerations on how to start the new ISS program spanning all national and international networks. What are you going to tell them? As an ISSM, what would you consider first? What types of questions would you ask the Board and/or to the CIO?
4
Concept 2: Physical & Logical ISS First day on the job and you find yourself already meeting with the local Physical Security and IT Services Managers at UUC. You introduce yourself as the new ISSM and both managers eagerly ask you “what can we do to help?” What do you tell these Managers? What types of questions would you ask the Managers? As an ISSM, what are some IT, computer, and network security issues you consider important to a new ISS program at UUC? What about your meeting with the Board of Directors earlier? How does it apply here?
5
Concept 3: Risk At the end of your first 30-days on the job, as an ISSM, you have been able to sUUCessfully develop and implement an ISS program for UUC. You decide to update the CIO on the progress of the UUC ISS program via email when all of a sudden the entire internal network goes down! Your Computer Network Defense Team is able to determine the source of the disruption to an unknown vulnerability that was exploited on a generic perimeter router. The CIO calls you into his office and indicates to you that he is “concerned about the Risk to the networks at UUC” and ‘wants a risk assessment conducted’ ASAP. What does the CIO mean by “Risk to the networks at UUC”? As a ISSM, how would you conduct a risk assessment for the CIO? How is risk measured and why is it important?
6
Concept Overview
7
Thank you! Questions? philiprobbins@email.phoenix.edu
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.