Megatrend of Demographics

Evaluate the megatrend of demographics in the IT field. Give your opinion as to why IT managers must understand this megatrend when selecting talent for organizational positions. According to the lesson, the changes in the economy, communicating and doing business with countries other than the US, will have impact on the selection of employees for […]

IT Security Policy Framework

Principles for Policy and Standards Development: Two principles for policy and standards development are Least Privilege and Simplicity. Least privilege would be the same, for the most part, for any organization, by definition, you only allow people who have a need to know something to have access to sensitive information. I think the complexity of […]

Managing Data Security

Every IT organization has the critical responsibility of providing a certain level of service. Such services includes the following: 1. Data Access: Every IT organization has service level agreements that dictates how the organization will retain and manage user data. 2. Level of Service: IT organizations focus on high-level customer service. Every IT organization strives […]

Bring Your Own Device (BYOD) or Bring Your Own Technology (BYOT)

With the proliferation of smart phones and intelligent computing tablets such as the iPad, enterprises are increasingly faced with employees who want to bring their own devices and connect to enterprise systems. Should employers should allow this type of connectivity to enterprise systems? Here are three examples with a predicted impact to an organization’s Total […]

Forming the CSIRT

What are the top two considerations that should be addressed when forming the CSIRT in terms of skills, abilities, procedures, training, deployment, etc? One top consideration to address when forming the CSIRT is the CSIRT structure and Team Model. The size, organization, and scope of the CSIRT will vary from organization to organization. This is […]