Follow the attach instructions to complete this work. Budgeting for Cybersecurity   You will start by writing a short paper as

 Follow the attach instructions to complete this work.

Budgeting for Cybersecurity

 

You will start by writing a short paper as described in the discussion question. You will be using information from this week’s readings and from your own research to address the information needs expressed in the question. Create an MS Word document containing your “short paper” (response) for the discussion topic. Use MS Word to spell check and grammar check your work!

Choose 
one of the following strategies for reducing the costs associated with responding to cyberattacks from the Rand Report* (
A Framework for Programming and Budgeting for Cybersecurity):

·     Minimize Exposure

·     Neutralize Attacks

·     Increase Resilience

·     Accelerate Recovery

Then, prepare a two-page briefing paper (5 to 7 paragraphs) for the Red Clay senior leadership and Red Clay corporate board that addresses planning, programming, and budgeting processes for your strategy. Your audience is the company’s IT Security Working group and includes both technical and non-technical managers and senior staff members responsible for budgeting. The general questions that this audience is interested in are:

· Planning: What will we do? (your chosen cybersecurity strategy)

· Programming: How and when will we do it?

· Budgeting: How much will it cost and how will we pay for it?

Remember to keep your focus on the 
processes related to planning, programming, and budgeting, not the actual hardware, software, etc. that needs to be acquired and paid for. You may, however, provide examples of hardware or software.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

*Rand Report: Davis, J. S., Libicki, M. C., Johnson, S. E., Kumar, J., Watson, M., & Karode, A. (2016).
 

A framework for programming and budgeting for cybersecurity

 (Rand TL-168). Retrieved from 

Rubrics

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Follow the attach instructions to complete this work. How does FedRAMP help agencies ensure that Digital Government services are secure?   Must

Follow the attach instructions to complete this work. How does FedRAMP help agencies ensure that Digital Government services are secure?   Must post first. Subscribe The format for your week 3 discussion is a backgrounder (“briefing paper”). Background papers are summaries of issues provided to help decision-makers/leaders/managers make decisions. Decision-makers

Follow the attach document to complete this work. International Cooperation for Cybersecurity   Prepare a 5- to 7-paragraph briefing statement

Follow the attach document to complete this work. International Cooperation for Cybersecurity   Prepare a 5- to 7-paragraph briefing statement that explains why wealthy nations and developing nations should work together to improve cybersecurity for the globally connected networks referred to as “the Internet.” Your statement should address the following.

Project 4: Postmigration Activities  Step 1: Postmigration Activities Overview  Like any software development project, migration projects require

Project 4: Postmigration Activities  Step 1: Postmigration Activities Overview  Like any software development project, migration projects require careful planning to ensure success. This planning includes the postmigration testing and maintenance phase. Start this project by researching and planning the  postmigration activities that will be required to get BallotOnline’s migrated workloads in