{"id":48087,"date":"2024-04-26T23:18:31","date_gmt":"2024-04-26T23:18:31","guid":{"rendered":"http:\/\/localhost\/branding\/cybersecurity-program-white-paper\/"},"modified":"2024-04-26T23:18:31","modified_gmt":"2024-04-26T23:18:31","slug":"cybersecurity-program-white-paper","status":"publish","type":"post","link":"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/","title":{"rendered":"Cybersecurity Program White Paper"},"content":{"rendered":"<p>Cybersecurity Program White Paper<\/p>\n<p>Assignment:<\/p>\n<p>You are the first Chief Information Security Officer (CISO) for your organization, and on your first day, you realize there are no impactful cybersecurity practices established or implemented, and decide to submit a white paper to the CEO, calling for action. Develop a project plan to stand up a brand new cybersecurity program in the form of a 10-13 page White Paper, referencing the course material, industry best practices, and NIST guidance.<\/p>\n<p>Guidelines:<\/p>\n<p>10-13 pages of content. In lieu of an abstract, write an executive summary. The executive summary, title page, and references page, are not included in the total.<\/p>\n<p>At a minimum, 10 references should be used. All cited articles, journals, books, and research, should be from credible sources and current within the last five years. Note: Wikipedia or personal blogs are not credible.<\/p>\n<p>Tables and graphics, if used, will count for no more than 1 page in the total. Anything more is welcome, but the space used will be deducted from the total page count. Remember that tables and graphics require in-text citations.<\/p>\n<p>APA formatting is required throughout &#8211; running head, page numbers, appropriate font, citations, etc.<\/p>\n<p>Content Tips:<\/p>\n<p>Understand the scope and value of your project.<\/p>\n<p>Describe the problem you are fixing by proposing this new cybersecurity program. This would include potential threat, financial loss, etc, that the organization faces due to lack of cybersecurity.<\/p>\n<p>Reference the NIST Cybersecurity Framework (v1.1) to build the structure of your program. This framework details each vital function of cybersecurity \u2013 Identify, Protect, Detect, Respond, and Recover \u2013 and will guide your research.<\/p>\n<p>Specifically, incorporate the steps detailed in section 3.2: Establishing or Improving a cybersecurity program.<\/p>\n<p>Keep in mind NIST is a starting point, but other resources are required (see Guidelines below).<\/p>\n<p>Be sure to include the following details:<\/p>\n<p>Include methods and best practices that satisfy each function in the framework. The categories and sub-categories offer more details for ensuring your program is robust. You do not have to list out and talk to every single sub-category; view them as data points to drive your vision.<\/p>\n<p>Write a security policy for your organization. The purpose of a security policy is to safeguard the confidentiality, integrity, and availability, of the organization\u2019s systems and information. Be sure to include objectives, scope, specific goals, and consequences in the event of noncompliance.<\/p>\n<p>Create a team. Define roles and responsibilities of all stakeholders, including those of the CISO.<\/p>\n<p>Describe the access control methods you would implement for your building and network.<\/p>\n<p>Develop a method to track performance and report metrics.<\/p>\n<p>Resources:<\/p>\n<p>For more guidance on paragraph and sentence structure, please visit the\u00a0Perdue Online Writing Lab (OWL)\u00a0(Links to an external site.).<\/p>\n<p>For APA guidance, download and reference\u00a0this APA formatting template.<\/p>\n<p>For tutoring or writing support, visit the\u00a0Webster Writing CenterLinks to an external site..<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Program White Paper Assignment: You are the first Chief Information Security Officer (CISO) for your organization, and on your<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-48087","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Program White Paper - sheilathewriter<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Program White Paper - sheilathewriter\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity Program White Paper Assignment: You are the first Chief Information Security Officer (CISO) for your organization, and on your\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/\" \/>\n<meta property=\"og:site_name\" content=\"sheilathewriter\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T23:18:31+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/\",\"name\":\"Cybersecurity Program White Paper - sheilathewriter\",\"isPartOf\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\"},\"datePublished\":\"2024-04-26T23:18:31+00:00\",\"author\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\"},\"breadcrumb\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sheilathewriter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Program White Paper\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/\",\"name\":\"sheilathewriter\",\"description\":\"Custom essay writing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/opskill.com\/propapers\"],\"url\":\"https:\/\/sheilathewriter.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Program White Paper - sheilathewriter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Program White Paper - sheilathewriter","og_description":"Cybersecurity Program White Paper Assignment: You are the first Chief Information Security Officer (CISO) for your organization, and on your","og_url":"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/","og_site_name":"sheilathewriter","article_published_time":"2024-04-26T23:18:31+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/","url":"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/","name":"Cybersecurity Program White Paper - sheilathewriter","isPartOf":{"@id":"https:\/\/sheilathewriter.com\/blog\/#website"},"datePublished":"2024-04-26T23:18:31+00:00","author":{"@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab"},"breadcrumb":{"@id":"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sheilathewriter.com\/blog\/cybersecurity-program-white-paper\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sheilathewriter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Program White Paper"}]},{"@type":"WebSite","@id":"https:\/\/sheilathewriter.com\/blog\/#website","url":"https:\/\/sheilathewriter.com\/blog\/","name":"sheilathewriter","description":"Custom essay writing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/opskill.com\/propapers"],"url":"https:\/\/sheilathewriter.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/48087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/comments?post=48087"}],"version-history":[{"count":0,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/48087\/revisions"}],"wp:attachment":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/media?parent=48087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/categories?post=48087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/tags?post=48087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}