1 / 12

CMGT 582 STUDY Become Exceptional--cmgt582study.com

FOR MORE CLASSES VISIT <br>www.cmgt582study.com<br> <br>You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department. <br>Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:<br>• Handling of ethical issues, including security-related legal/regulatory compliance (non-privacy related), intellectual property and licensing<br>

claric94
Download Presentation

CMGT 582 STUDY Become Exceptional--cmgt582study.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CMGT 582 STUDY Become Exceptional--cmgt582study.com

  2. CMGT 582 STUDY Become Exceptional--cmgt582study.com CMGT 582 Assignment Audit of the HR Department FOR MORE CLASSES VISIT www.cmgt582study.com You are part of a team has been selected by the Chief Information Officer (CIO) to perform an audit of the HR Department. Create a 10- to 12-slide presentation (not including the title and reference slides) that examines the specific audit steps that should be performed to evaluate the following areas:

  3. CMGT 582 STUDY Become Exceptional--cmgt582study.com CMGT 582 Week 1 Individual Assignment Getting Involved FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Fostering Collective Responsibility for IT Risk" video. Watch the "Balancing Security with User Convenience" video.

  4. CMGT 582 STUDY Become Exceptional--cmgt582study.com CMGT 582 Week 2 Individual Assignment Security Within My Organization FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Technology and the Impact on Business and the Environment" Skillsoft video.

  5. CMGT 582 STUDY Become Exceptional--cmgt582study.com CMGT 582 Week 3 Assignment Privacy with Ethics Considerations FOR MORE CLASSES VISIT www.cmgt582study.com Create a 10- to 12-slide presentation evaluating the three areas of privacy issues specific to FERPA, HIPAA, and EEA. Develop scenarios in all of the three areas that you feel are most important to the recipients protected by these laws and the methodology used in each.

  6. CMGT 582 STUDY Become Exceptional--cmgt582study.com CMGT 582 Week 3 Individual Assignment Risk Assessment FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "QuickTalks: David Bach: Nonmarket Strategy: The Next Frontier of Competitive Advantage" Skillsoft® video.

  7. CMGT 582 STUDY Become Exceptional--cmgt582study.com CMGT 582 Week 4 Individual Assignment Technologies and Methodologies Evaluation FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the SkillSoft® videos, completing the SkillSoft® course, independent student reading, and research. Watch the "Creating an Actionable Risk Management Strategy" SkillSoft® video.

  8. CMGT 582 STUDY Become Exceptional--cmgt582study.com CMGT 582 Week 5 Assignment Mitigating Information Management Risk FOR MORE CLASSES VISIT www.cmgt582study.com Consider information security risks, including: Cybercrime and cyber-related crimes Social engineering Mobile computing BYOD (Bring your own device). Write a 3 full page evaluation (not including the title and reference pages) of security technologies and methodologies

  9. CMGT 582 STUDY Become Exceptional--cmgt582study.com CMGT 582 Week 5 Individual Assignment Policy Implementation Presentation FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1."

  10. CMGT 582 STUDY Become Exceptional--cmgt582study.com CMGT 582 Week 5 Individual Assignment Policy Implementation FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Security Policy Documents and Life Cycle" topic of the Skillsoft® course "SSCP Domain: Security Operations and Administration Part 1."

  11. CMGT 582 STUDY Become Exceptional--cmgt582study.com CMGT 582 Week 6 Individual Assignment Systems Development Life Cycle (SDLC) FOR MORE CLASSES VISIT www.cmgt582study.com Assignment Preparation: Activities include watching the completing the SkillSoft®course, independent student reading, and research. Complete the "Information Risk Management Overview" topic of the "Information Risk Management Program" lesson of the Skillsoft® course "CISM 2012: Information Risk Management and Compliance (Part 1)."

  12. CMGT 582 STUDY Become Exceptional--cmgt582study.com

More Related