MSIA Organization Case Study

Great Essays
MSIA Organization Case Study Proposal
Submitted by: Jason R. Denny

1. Briefly describe your responsibilities at your employer, even if your employer is not your case study organization.
I report directly to the VP of Privacy & Security Governance; my job function is to act as the Security Compliance Manager within our Security Governance team. The overall purpose of my position is to implement the appropriate processes and procedures for auditing and assessing, ensuring proper compliance throughout various information security standards and controls; up to and including tracking and managing any corrective actions that may derive from the various audits and assessments.
I am an integral member of the team in regards to security program development, vulnerability management, physical security, and documentation development. In an effort to help bridge the gap between security and various business units I participate in various meetings and committees such as our Information Security Management Group (ISMG), Security Checkpoint, Change Management, and different IT Steering Committees. I also act as one of the primary liaisons between us and our parent-company where I participate in similar meetings and committees to ensure we are adhering and aligning ourselves appropriately with our parent-company.
2.
…show more content…
In addition, we purposely chose to have one of the most respected and well-known accreditation firms perform our certification: BSI. We obtained our certification in 2011 and then renewed to the ISO 27001:2013 standard in 2015. Finally, we are in the midst of further strengthening our security program by also aligning ourselves with the HITRUST framework while continuing to adhere with ISO amongst other client and legislative demands (HIPAA, HITECH Act,

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Not updating and patching a system regularly can have serve consequences. OS updates could introduce new vulnerabilities. All this need to be kept track of. I can solve this problem with a logging and auditing policy. B. Policy Statements After researching the national and international standards, create three policy statements that apply to the entire organization, comply with a national or international standard, and might have prevented the security breaches identified in part A. 1.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    MOS Team Case Study

    • 203 Words
    • 1 Pages

    MOS team notified Sgt. Van Dyke, who ordered the MOS team to investigate. MOS approached the males and identified themselves as police officers and asked the males to stop and for their identification. The two males stopped and complied. However, P pushed MOS Tiernan and continued to walk.…

    • 203 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Mcdermott Case Study

    • 611 Words
    • 3 Pages

    On August 28, 2014 Detective Timothy McDermott was facing charges that accused him of violating Chicago Police Department Rules 2, 6, 8, and 38. These rules regard to bringing discredit to the Chicago Police Department, impeding the department’s efforts to achieve its goals, failing to ensure a person’s right to have dignified treatment under the law, failing to treat a person with respect and dignity, disrespecting or maltreatment of a person while on or off duty, and unlawful and unnecessary display of a gun. The only evidence presented at the hearing was a copy of a photograph that depicted Detective McDermott and another CPD officer posing with an African American male. Detective McDermott was kneeled next to the African American male while…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    However, you did not complete the following required trainings: Continuity of Operations and Fixed Assists. You completed 4 additional training (shown below) during this rating period to enhance your professional development and you completed an 8 hour course in Mental Health First Aid which resulted in you receiving a certification in this area from 10/2015 -10/2018. Anjail you continue to be a vital part in developing necessary changes in local operations.…

    • 1453 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    AOI Strategy Case Study

    • 1219 Words
    • 5 Pages

    In January of 2007, President George W. Bush announced a new campaign strategy on the war against terror. The surge was a way forward to a more unified, democratic federation that can sustain, govern, and defend itself in future generations. His plan involved the deployment of 28,000 additional U.S. troops to the Anbar Province and Baghdad Area of Influence (AOI). The AOI strategy was based on six essential elements that derived from a proposal meeting with senior Iraqi officials; let the Iraqis lead, help Iraqis protect the population, isolate extremists, create space for political progress, diversify political and economic efforts, and situate the strategy in a regional approach (Mansoor 2013). The rapid deployment of five additional Brigades, in support of surge operations, spanned over a five-month period, from January to May of 2007.…

    • 1219 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    CHEVRON’S INFRASTRUCTURE EVOLUTION Glad Bernard Toppo Campbellsville University The first two heading levels get their own paragraph, as shown here. Headings 3, 4, and 5 are run-in headings used at the beginning of the paragraph. Seismic Imaging Technology. How it works and how it has helped Chevron discover new oil and gas reservoirs. Also known as Reflection Seismology, this is an exploration method used by oil and gas companies to gauge and estimate the seismic characters of the Earth’s sub-surface.…

    • 952 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    My position within the Texas Department of Public Safety is the detail leader for the Lieutenant Governor’s protection detail. The detail consists of five Agents. We have the honor of protecting the Lieutenant Governor and his wife. My detail and I must adhere to the seven qualities of a professional in order to perform successfully. Protection duties involve the actual protection of a protectee, advance duties, and communication skills.…

    • 379 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Unit 3 P1

    • 544 Words
    • 3 Pages

    The health and safety act the main piece of legislation covering health and safety in all workplaces in Great Britain. The Health and Safety Executive, alongside local authorities (and other enforcing authorities) is responsible for applying the Act and a number of additional Acts related to the working environment. The health and safety act applies to everyone in the work places. If the organisation do not meet the demands of the heathy and safety work act, they will not be allow to function.…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Microsoft Case Study

    • 1362 Words
    • 6 Pages

    Gates licensed MS-DOS to IBM, which it had acquired from a local computer manufacturer. The story of how Microsoft acquired the original system (QDOS) has inspired much folklore, which often portrays Gates pouncing on a trivial mistake by Digital Research and stealing that company's lead in microcomputer operating systems. It is frequently cited by those who accuse Gates of unethical business practices. In reality, IBM did approach Digital Research for a version of CP/M for its upcoming IBM PC, and spoke to Gary Kildall's wife Dorothy. IBM representatives wanted Dorothy to sign their standard non-disclosure agreement, which Dorothy considered overly burdensome.…

    • 1362 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Microsoft Case Study

    • 2744 Words
    • 11 Pages

    Microsoft had a big break in the 1980’s when IBM began to develop the first Personal Computer, also known as a PC. IBM had asked Microsoft to sign a contract with them in order for IBM to gain a workable program for the PC and provide an operating system. Microsoft took the contract and created the world’s leading PC for IBM. After a few other contracts Microsoft bought the PC from IBM and soon out sold their products. Microsoft now had the PC’s and the software to compete and beat all the competition around.…

    • 2744 Words
    • 11 Pages
    Great Essays
  • Great Essays

    Agoda Case Study

    • 1885 Words
    • 8 Pages

    AGODA The passion for travel as well as time limitation due to busy schedule, has created the travel platforms which you can access while sitting at home. Agoda is such a destination and one of the fastest- growing online travel booking website. This start-up was established in 2005 and was quickly expanded in Asia. The Priceline Group, one of the world’s largest online hotel seller, acquired it in 2007.…

    • 1885 Words
    • 8 Pages
    Great Essays