and knowledge 5 Importance of the IT security and business

  Contents Task A: SWOT Analysis 2 References 3 Task B: Cybersecurity, Compliance, and Business Continuity 4 Executive Summary 4 Introduction 4 Methodologies and the Demographics 5 Responsibility and knowledge 5 Importance of the IT security and business continuity 6 Perception of the IT risks 7 IT Security Controls 7 Disruption and Consequences of damage 8 Approaches to address the security and the business continuity 8 Next Relevant steps 9 Conclusion 11 References 12   Task A: SWOT Analysis Organisation: Coles Description of ICT: It allows the system to place the employees to properly monitor the stock, market, sales, ordering, sales and the other reports. It includes the planning through the private intranet and the store managers can handle the communication through the mobile applications on android. Summary and Recommendations: It includes how the services can revolutionise Coles to work on the business forms and then improve the market edge. The implementation is performed through the day to day tasks with the applications providing the continuity as well as the efficiency to work on the retaining and the change of the working practices. The implementation and the platform includes the business growth and the evolvement. Short Term (Now): This works with the implementation and then working over the user training patterns. The changes for the UI are found to be simple as well. Mid Term (12 months): It is related to the complete integration and the use of the old systems which could easily be removed with the integration and working over the fully trained patterns. The testing is mainly for check on the security issues. This includes the consideration of the changes for the UI to make the data simple. With the midterm for the next 12 months. Long Term for 3-5 years:It includes the consideration of adding the features and the add-ons which allow the BYOD using the business allowing the non-managers to properly access the devices. References Bohari, A. M., Hin, C. W., &Fuad, N. (2017). The competitiveness of halal food industry in Malaysia: A SWOT-ICT analysis. Geografia-Malaysian Journal of Society and Space, 9(1). McLean, G. N. (2017). Will SOAR really help organization development soar?. New Horizons in Adult Education and Human Resource Development, 29(1), 25-28. Culp III, K., Eastwood, C., Turner, S., Goodman, M., & Ricketts, K. G. (2016). Using a SWOT Analysis: Taking a Look at Your Organization [2016].  Task B:Cybersecurity, Compliance, and Business Continuity Executive Summary The financial patterns are related to the information technology which includes the agreement of the IT security and the business continuity. It includes the forms which works with the disruptions due to the common threats like the natural and the manmade disasters, loss of the data and the security breach. The forms are also related to work on the different financial executives where the organisations tend to lack the formal IT security and the business continuity plans. The importance is based on uninterrupted flow of the business where 95% of the survey respondents have clearly showed that the cybersecurity and compliance is important for the organisations (Levy et al., 2016). Index terms: security, compliance, business, risks measurement Introduction As per the financial executives, there are different responsibilities which need to be complied with the organisation development. It includes the roles related to the financial reporting and the accounting measures which are depending upon the taxation and the risk measurement, compliance and the other assumptions for the IT structure. The IT growth is based on the technological development, where the major focus is on the power failure where the threats are increasing with the growth that are skilled. The organisation are working with the infrastructure development where the study includes the steps to mitigate the organisational risks with the existing resources that have certain constraints on time, staff and the budget (Furfaro et al., 2016). Methodologies and the Demographics Here, the forms are related to the distribution patterns which includes the range that works with the different industries and the sectors. It also includes the executives from the small, medium and the large organisations, where the insights are related with the connections by the videoconference. Responsibility and knowledge According to the survey, there are different high level of the assumptions which are mainly focusing on ensuring the compliance, management of the budgets, and then evaluating the business risks. They are based on working over the financial priorities that holds the security risks management features where the planning is based on the IT security and then working over the different measures related to the organisation growth (McCollum, 2016). The direct hold of the IT security responsibility is based on the forms, where the IT security spending, eclipsed by the president and the CEO of the plan at the organisation employ 79% of the respondents. Importance of the IT security and business continuity There are different forms for the survey respondent which includes the business continuity that is defined through the uninterrupted flow of the business. Here, the forms are also related to the ranking which are depending upon how the IT security and the business continuity can work on the survey respondents and the other 10 respondents in the company. The applications are for the ad hoc where the survey is based on how the organisation can match with the IT security management program with the activities that are being partially deployed (Ojeka et al., 2017). The forms are set with the formal strategy where the companies try to retain and manage the IT risks which are related to the rapid business growth. The environment development comes from the large organisation to access and allow the employees with the sense of processing and streamlining the diminished cultures and evaluating it in a proper manner. Perception of the IT risks There are different risks which are related to the forms where the organisation leaders need to focus on the revenues, and the brand images. The respondents with the formal strategies is mainly recognized through the IT risks that affect the revenue growth with the ad-hoc strategy. Working in the company mainly includes how the people can handle the IT security with the planning that tends to upgrade the security software. Hence, for this, there is a need to check on the changes of the antivirus form and the antispam software (Gordon et al., 2016). This will help in balancing and helping the people to access the business applications depending upon the requirements, public zone patterns. IT Security Controls The forms are related to the firewall with the identity and the access controls. The ethical hacking tests are set with the in-place hacking and the testing, which includes how the attacks of the computer or the network impact the security. It is then related to the behalf of the owners with the discovery points which the malicious hacker could identify. The Bring Your Own Device policy is mainly for the younger employees which includes how the company policies can make sure of the devices at work. It includes the agreement of the installation of the applications that enable the remote control of the device. Here, the software can easily trigger and work on the immunization of the device. Disruption and Consequences of damage The survey is depending upon the different business processes or the IT processes which includes how the organisation works over the disruption to the business processes and then handle the natural or the manmade disaster of the rare events. This also includes the disruption to the business which work on how the cyber security are the rare events (Smith et al., 2016). As per the analysis, there are different issues of the system failure which includes the experiences of the people, the loss of data and the breach of the security or the system failure. Hence, it is important to work on the improve
ment measures which is possible through the improvement of the effective IT risks management programs for the security and the business community. It includes the other forms which works for the risks awareness at the insufficient level, analysis and the assessments. There is a need to evaluate the lack of expertise with the knowledge or staff that includes the lack of funding and the insufficient forms of the risks awareness, analysis and the assessments. Approaches to address the security and the business continuity This includes the building of the risk and then measuring the risks aware of the culture and the management system. It includes the management with the easy check on the security incidents with the check on the controlled network access and the assurance of the resilience. The addressing of the cloud and the virtualisation works with the management of the secured data and the protection of the privacy (Reddy et al., 2016). This helps in the management of the identity lifecycle and then making sure of the disaster recovery plans, processes and how the tests are worked on. The understanding is depending upon the increased demands with the availability that is set for the business unit or the applications. The understanding is about the applications and the operations where the business continuity plans are critical to support the functions like the payroll. Here, the assurance is also based on the effective communication patterns with the workforce that includes the public, suppliers and the partners. This includes the use of the social media as well. The assurance is based on regaining the access to the different information techniques with the resuming of the tasks which is related to the virtual facilities and understanding the impact of how the third partycan handle the different business models. For this, the example is about how the third-party vendors generally adhere to the continuity pattern standards as one’s own company. The assurance of the disaster recovery plans and the processes are considered up to data and tested which includes the encompassing forms with the use of reputational risks as a metric and the consideration is also for the ROI. The companies like IBM works on the global business and the innovation in research and the development which includes not only how to shape the future of the society but also work with the government corporations based on the ground breaking real-worldproblems. Through this, one can also work towards the development of the highly skilled Canadians, with engaging them in meaningful work. Next Relevant steps As per the analysis, it is important to focus on the different respondents which includes how the organisation can work on the improvement of the IT security and the business continuity forms. The planning is depending upon the business interruption, with redundancy and increase in the frequency of the system review (Shi et al., 2017). It includes the evaluation of the board awareness with the easy management of the risk and the education that includes the training of the staff. The board awareness with the easy management of the risks is important for the easy allocation of the resources. It is important to focus on the calculation of the security budgets and then making a business case that relates to how the IT can spend on the average of the firm which is surveyed through the different IT budget on the security spending. The Gartner also found that there is different form which include how the customers can work towards the maturity and the security programs that will help in improving the overall spending decree. The allocations are set with the divisional budgets with the companies working on the embedded budgets and the operational areas. This is important to evaluate the system forms and the functions which includes the pure security measures that are related to the security intelligence and the network security. The issues like the patch management need to be handled with the contribution towards the different groups and how the operational levels could be evaluated depending upon the threat management, threat response and the governance. Here, there are different forms of the management functions which includes the threats and the response with the governance related to the dedicated security patterns. The work is also related to the proliferation of the mobile devices with the ability to facilitate the dissemination of the information. It leads to the efficiency improvement depending upon how the attention to the security, employee training is set. The dangers are also related to the off-site locations where the communication comes with the unencrypted data from the device. Hence, for this, there is a need to check on the enhancement with the leading forms that is required in the area (Shah et al., 2016). Conclusion As per the patterns and the survey, the forms of the planning are based on working over how the participants can maintain the business continuity with the events of the power failure, natural disaster or the human error. The plan is mainly to identify the weakness and then protect the organisational systems which is mainly found to be against the hacking and the other cyber threats. The plans are acknowledged with the forms where the business continuity process and the policies are consistent that is applied through the organisation. It is important to focus on how the company can work on the development of the unified patterns with the consistent approach that is followed by the different companies. The improvement of the cybersecurity is mainly with handling the organisations and then working over the lack of resources. The check is on gaining the buy-in of the colleagues to support the improvements and then working over the improved security as well (Rose, 2016). The achievements are mainly by the painting of the apocalyptic scenario rather than presenting the reasoning of the business plans which includes the potential impacts to handle the generation of the revenue, bottom link and the brand image with the operational downtime.   References Levy, J., Yu, P., &Prizzia, R. (2016). Economic Disruptions, Business Continuity Planning and Disaster Forensic Analysis: The Hawaii Business Recovery Center (HIBRC) Project. In Disaster Forensics (pp. 315-334). Springer International Publishing. McCollum, T. (2016). Time to shift the mind-set: pulse report urges internal audit to focus on culture and cybersecurity response. Internal Auditor, 73(2), 11-13. Ojeka, S., Ben-Caleb, E., & Ekpe, E. O. I. (2017). Cyber Security in the Nigerian Banking Sector: An Appraisal of Audit Committee Effectiveness. International Review of Management and Marketing, 7(2), 340-346. Gordon, K., & Gordon, K. (2016). SEC proposes rules on adviser business continuity and transition plans. Journal of Investment Compliance, 17(4), 65-70. Smith, E., Corzine, S., Racey, D., Dunne, P., Hassett, C., & Weiss, J. (2016). Going Beyond Cybersecurity Compliance: What Power and Utility Companies Really Need To Consider. IEEE Power and Energy Magazine, 14(5), 48-56. Reddy, D., & Rao, V. (2016). Cybersecurity Skills: The Moderating Role in the Relationship between Cybersecurity Awareness and Compliance. Shi, Y., Booth, R. E., & Simon, J. (2017). The Iterative Effect of IT Identity on Employee Cybersecurity Compliance Behaviors. Shah, A., Selman, S., &Abualhaol, I. (2016). License Compliance in Open Source Cybersecurity Projects. Technology Innovation Management Review, 6(2). Rose, R. V. (2016). The US Securities and Exchange Commission and The Many Faces of Cybersecurity Liability. EDPACS, 53(1), 10-15. Furfaro, A., Gallo, T., &Saccà, D. (2016, August). Modeling cyber systemic risk for the business continuity plan of a bank. In International Conference on Availability, Reliability, and Security (pp. 158-174). Springer International Publishing.

Leave a Reply

Your email address will not be published. Required fields are marked *