Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
course.content.assessment.attempt.menuAssignmentUnit III Case StudyUnit III Case StudyAssignment Content Policy Writing Approach Refer to “Case Study: Policy Writing Approach” found on page 102 of you
Policy Writing Approach
Refer to “Case Study: Policy Writing Approach” found on page 102 of your textbook and copied below.
Regional Bank has been growing rapidly. In the past two years, it has acquired six smaller financial institutions. The long-term strategic plan is for the bank to keep growing and to “go public” within the next three to five years. FDIC regulators have told management that they will not approve any additional acquisitions until the bank strengthens its information security program. The regulators commented that Regional Bank’s information security policy is confusing, lacking in structure, and filled with discrepancies.
You have been tasked with fixing the problems with the policy document. Write a two-page case study that includes the following sections.
- Introduction: Current Problem
- Discussion
- Where do you begin this project?
- Would you use any material from the original document?
- What other materials should you request?
- Would you want to interview the author of the original policy?
- Who else would you interview? Should the bank work toward ISO certification?
- Which ISO 27002:2013 domains and sections would you include?
- Should you use NIST’s Cybersecurity Framework (CIA security model) and related tools? If yes, explain why the tools selected are important to IS policy writing.
- Which methods of communication should you use to send the policy?
- What other criteria should you consider?
- Conclusion
- References
2. Should organizations have data or information owners? Please explain why or why not. Consider the costs, roles, and responsibilities for the data and information. (2 paragraphs or more)