140 likes | 161 Views
Business Intelligence. Lecture 15: Cybersecurity management. Overview.
E N D
Business Intelligence Lecture 15:Cybersecurity management
Overview • Understanding the personal, organisational, and legal/regulatory context in which these tools could be used, the risks of such use, and the constraints (such as time, finance, and people) that may affect how cybersecurity is implemented.
content • Overview • Cybersecurity • Using BI Tools For Effective Decision Making • Personal • Organisational • Legal/Regulatory • Risks • Constraints
Figure 1 – Sisense Dashboards – showing the privileges set for each role
End of chapter • References • https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html • https://www.sisense.com/guides/guide-everything-you-need-to-know-about-security-in-a-bi-solution/ • -http://www.scientect.com/the-role-of-cybersecurity-in-an-organization/