Assessment Description Planning is a quintessential bedrock of any program in the professional world. IT and cybersecurity are no different in this foundation. We plan for the worst and hope for the b – Essay World Experts

Assessment Description

Planning is a quintessential bedrock of any program in the professional world. IT and cybersecurity are no different in this foundation. We plan for the worst and hope for the best.

For College of Science, Engineering, and Technology students enrolled in the course, this assignment will be Phase 1 in the creation of your “Programmatic Business Continuity Plan Project” that will be completed in stages throughout your programmatic courses. The project will be finalized and submitted in CYB690 or ITT660, depending on your major. Review “Business Continuity Plan (BCP)” and the topic Resources for details about the project.

As you begin the project, it is important to select an industry that is of interest to you. You may select virtually any industry including retail, education, telecommunications, health care, finance, etc. Create a fictional business within this industry to be the basis for your project. As you develop your project, imagine yourself in the role of the Chief Intelligence Officer for Master of Science in Information Technology and MBA in Cybersecurity students, or the Chief Information Security Office for Master of Science in Information Assurance and Cybersecurity and Master of Science in Cybersecurity students.

In this assignment, complete the first stage of our Business Continuity Plan (BCP) by developing the primary outline for a BCP to identify key aspects of the organization.

It is important to remember that according to the definition provided in ISO 32302, a BCP is “documented procedures that guide organizations to respond, recover, resume, and restore to a predefined level of operation following disruption.”

Review the topic Resources associated with ISO 27001 and NIST SP 80053 and conduct your own research about each to prepare for this assignment.

Reference the “FEMA Small Business Continuity Plan Template” and “Risk Assessment Matrix” located in the topic Resources to complete the assignment. The FEMA template can be used but copying and pasting any section of the document for the assignment constitutes plagiarism and will be treated as such. Use your own words when filling out each section of the BCP.

Develop the Phase 1 content for your company’s BCP. Phase 1 should include all the following:

  • Executive Overview: Be precise and detailed and provide a detailed understanding of the program.
  • Document Change Control: Chart should be completed.
  • Introduction: Include the Overview, Plan Scope, and Applicability that evaluates the appropriateness of cybersecurity frameworks for developing a cybersecurity program to align with business needs, Plan Objectives, and Plan Assumptions.
  • Risk Assessment Matrix Template: Complete the “Risk Assessment Matrix Template” provided as this element is not shown in the sample BCP template.
  • Critical Business Functions Overview: Detail components that are critical to business operations and provide a clear understanding of what the program is designed to address.
  • Company Organizational Chart: Create your own as this is not shown in the sample template. Include the following key positions: CEO, CFO, CIO, CISO, and COO.

Submit the BCP including the completed “Risk Assessment Matrix Template” and Company Organizational Chart.

Note: Retain a copy of this assignment for the Business Continuity Plan, which will be finalized and submitted in either CYB690 or ITT660, depending on your major.

Support the BCP with a minimum of three scholarly resources.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center. 

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.  

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.

This benchmark assignment assesses the following programmatic competencies: 

MBA Cybersecurity

5.2: Evaluate the appropriateness of cybersecurity frameworks for developing a cybersecurity program to align with business needs.

MS Information Assurance & Cybersecurity

2.1: Evaluate the appropriateness of cybersecurity frameworks for developing a cybersecurity program to align with business needs.

Attachments

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more