Project 4 Enterprise Cybersecurity Program Step 18 Record The Presentation see attachment Project 4: Enterprise Cybersecurity Program Step 14: Design the E

Project 4 Enterprise Cybersecurity Program Step 18 Record The Presentation see attachment Project 4: Enterprise Cybersecurity Program
Step 14: Design the E

Click here to Order a Custom answer to this Question from our writers. It’s fast and plagiarism-free.

Project 4 Enterprise Cybersecurity Program Step 18 Record The Presentation see attachment Project 4: Enterprise Cybersecurity Program
Step 14: Design the Enterprise Cybersecurity Program
Based upon all of the reports submitted thus far, as well as feedback received, design the enterprise cybersecurity program. Begin with the enhanced defense framework as a foundation to your cybersecurity program design. Included in the design should be the three program components of simulation, policy, and technology. Finally, the program design should incorporate
strategic foresight leadership
and
strategic alignment to core business functions
.
You will include the cybersecurity program design as a section in the final Enterprise Cybersecurity Program Report to the board of directors.
In the next step, you will check the credibility of your resources.

https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp640/learning-topic-list/strategic-foresight-leadership.html?ou=642034

https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp640/learning-topic-list/strategic-alignment-to-core-business-functions.html?ou=642034

Project 4: Enterprise Cybersecurity Program
Step 15: Incorporate Credible Support
In order to thoroughly explain why each concept is important, you may need to support your statements with scholarly references. A large part of the final result should be a focus on policies and procedures that should be implemented to leverage the technology, not just depend on the technology to provide maximum cybersecurity defense capabilities. Scan and make note of resources to support your statements in your report. In the next step, you will compile the report.

Project 4: Enterprise Cybersecurity Program
Step 16: Compile the Enterprise Cybersecurity Program Report
Throughout this project, you have completed all of the pieces critical to an enterprise cybersecurity program. Use the
Enterprise Cybersecurity Program Report Instructions
to help compile the work into a comprehensive report. This report will document and explain the components of the new cybersecurity program you have designed for the organization. The report will also support your program design. This report will accompany your oral presentation to the board of directors. Use this report in the next several steps to prepare the presentation.

https://leocontent.umgc.edu/content/umuc/tgs/cmp/cmp640/2218/course-resource-list/enterprise-cybersecurity-program-report-instructions.html?ou=642034

Project 4: Enterprise Cybersecurity Program
Step 17: Write Presentation Script
Use the Enterprise Cybersecurity Program Report completed in the previous step to prepare your oral presentation to the board of directors. Write the presentation by first outlining the key points to be covered during the presentation.
Remember that there will be nontechnical executives in the audience to whom you will have to sell your program. You will have five to 10 minutes to present your findings, help the executive leaders understand why the program will work, and why it is a good investment for the institution. You will practice and record the presentation in the next step.
This should be in word format and separate attachment.
Project 4: Enterprise Cybersecurity Program
Step 18: Record the Presentation
Now that you have written your presentation script, you will need to prepare for the presentation through review and practice. Review your presentation for clarity, making sure the board of directors will understand your proposed cybersecurity program, why it will work, and why it is a good investment for the institution.
Once you are satisfied with the script, practice reading through it two or three times, timing yourself to make sure you are within the five- to 10-minute range. After you are satisfied with your delivery, record the presentation. The type of device that you will use to make your recording will determine how you will record the audio file. Refer to the documentation for your specific device for more information. Once you are ready to move forward, record your oral presentation in MP3 format. I will do the recording but an example will be helpful.
Project 4: Enterprise Cybersecurity Program
Step 19: Submit the Enterprise Cybersecurity Program Report and Oral Presentation
Congratulations on designing a solid enterprise cybersecurity program for your organization! Submit your Enterprise Cybersecurity Program Report and Oral Presentation files to the CIO.
Check Your Evaluation Criteria
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.
· 1.8: Create clear oral messages.
· 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
· 8.3: Design a cybersecurity defense framework composed of technologies and policies.

Submission for Project 4: Enterprise Cybersecurity Program Report and Oral Presentation

Place your order now for a similar assignment and have exceptional work written by one of our experts, guaranteeing you an A result.

Need an Essay Written?

This sample is available to anyone. If you want a unique paper order it from one of our professional writers.

Get help with your academic paper right away

Quality & Timely Delivery

Free Editing & Plagiarism Check

Security, Privacy & Confidentiality