Prepare a short “talking points” paper in which you answer the question: What best practices should Sifers-Grayson follow when establishing a SOCC?
In your talking points, you should address how your selected best practices support the phases of the incident response process (i.e. Incident Detection, Containment, Eradication, & Recovery) and discuss the role of that a Security Operations Center will play in making sure that incidents are handled and reported in an effective and efficient manner.
Your “talking points” should be 3 to 5 paragraphs long (15 – 25 specific bullet points).
Your audience is a group of Sifers-Grayson executives who are reviewing the plans for establishing an internal SOCC. (Outsourcing the SOCC was considered and that option was rejected.)
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article.
Nofsinger Consulting has recommended that Sifers-Grayson invest in an Enterprise Architecture tool to help it document the assets, processes, and network infrastructure that comprise its information enterprise. Based upon past experience with such recommendations, the Nofsinger team knows that it must be prepared for debate amongst the client’s managers and executives as to the relative merits of such tools.
To help your team prepare for the expected debate, you have been asked to write a 3 to 5 paragraph response to the question “Why does Sifers-Grayson need an Enterprise Architecture tool?”
You should focus on the benefits of having a tool that can help guide the creation of an enterprise architecture.
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.
You are approaching the end of your time supporting Sifers-Grayson. Your team leader has asked you to prepare a 2 page research and analysis brief (“briefing paper”) for the company’s executives in which you identify the five most important technologies which the company should adopt in order to improve its security posture.
Provide specific details as to why each technology is required (what is the vulnerability or weakness that the technology will address). Then, make a recommendation for how the company should implement that technology. You must provide specific, actionable information. Your recommendations must also be based upon recognized best practices. Include the following steps in your research and analysis as you select and evaluate technologies, products, and services that will help improve the company’s security posture:
o Identify Candidate Technologies
o Research Products and Services which implement the technologies
o Identify Vendors
o Evaluate Products & Services (use existing market research)
Cite the sources of information used in your research and analysis (document where you obtained your information from). Use a professional citation format and provide a reference list at the end of your briefing paper.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more