instructions included
Remember to be clear about what action you are recommending. Executive management will want to understand not only what you discovered, but also what you propose as a solution. The company’s leaders will want to know what decisions they need to make based on your findings. Give them the actionable information they need to decide. You may want to review these presentation resources to help you with your narrated presentation. You will provide voice annotation for all slides in the following format: · 7 slides; limit bullets to no more than six per slide · voice annotation for every slide (excluding the reference slide) · a reference slide with one to two quality sources How Will My Work Be Evaluated? As you progress in your cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. By summarizing your results and recommendations to management in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your recommendations to provide information for decision makers in a format that uses the right mix of technical detail in a business context is an important workplace and career skill. The following evaluation criteria aligned to the competencies will be used to grade your assignment: · 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal. · 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. · 2.1.3: Explain the significance of the issue or problem. · 12.3.2: Describe the implementation of controls. · 12.8.1: Recognize the process to obtain approval from the business process owner. · 13.2.1: Evaluate vendor recommendations in the context of organization requirements. If you haven’t already downloaded it last week, download the Presentation to Management Template now and follow the instructions in the document. Exceeds Performance Requirements Meets Performance Requirements Approaches Performance Requirements Does Not Meet Performance Requirements Criterion Score 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal. 14 points Employs a format, style, and tone completely appropriate to the audience, context, and goal. 11.9 points Employs a format, style, and tone appropriate to the audience, context, and goal. 10.5 points Attempts to employ a format, style, and tone appropriate to the audience, context, and goal, but there are gaps 0 points Style employed is not appropriate to audience, context, or goal. / 14 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 14 points Integrates completely appropriate and highly credible sources to illustrate and validate ideas. 11.9 points Integrates appropriate credible sources to illustrate and validate ideas. 10.5 points Attempts to integrate sources to illustrate and validate ideas, but there are problems with source credibility or appropriateness, or the integration is choppy. 0 points Does not integrate sources to illustrate and validate ideas. / 14 2.1.3: Explain the significance of the issue or problem. 15 points Explains the significance of the issue or problem succinctly and thoroughly. 12.75 points Explains the significance of the issue or problem. 11.25 points Attempts to explain the significance of the issue or problem, but the explanation is not clear or is not appropriate for the context 0 points Does not explain the significance of the issue or problem. / 15 12.3.2: Describe the implementation of controls. 19 points Describes in an accurate and thorough manner how relevant IT controls are effectively implemented. 16.15 points Describes the implementation of relevant IT controls. 14.25 points Describes the implementation of IT controls, but the description lacks sufficient detail or accuracy. 0 points Does not describe the implementation of IT relevant controls. / 19 12.8.1: Recognize the process to obtain approval from the business process owner. 19 points Makes strong recommendations with justification to management about purchasing software to fit the company’s business needs. 16.15 points Makes recommendations with justification to management about purchasing software to fit the company’s business needs. 14.25 points Makes recommendations but without justification to management about purchasing software to fit the company’s business needs. 0 points Does not make recommendations to management about purchasing software to fit the company’s business needs. / 19 13.2.1: Evaluate vendor recommendations in the context of organization requirements 19 points Evaluate and provides detailed justification for vendor recommendations in the context of organization requirements. 16.15 points Evaluates vendor recommendations in the context of organization requirements. 14.25 points Attempts to evaluate vendor recommendations in the context of organization requirements, but some recommendations lack detail or do not consider context. 0 points Does not evaluate vendor recommendations in the context of organization requirements. / 19 Rubric Total ScoreTotal / 100 PowerPoint Presentation
CMIT 421 July 6, 2020 Good morning. My name is . I work in the MERCURY USA Information Security and Technology Department as a cyber threat analyst. Today, I’ll be presenting our proposal to address the CEO’s mandate to protect the organization from dangerous ransomware attacks. Let’s get started. 1 AGENDA 2 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! Tell your audience what you intend to cover in your proposal. This is the PURPOSE of your communication! You should cover the three areas enumerated in the Project 3 instructions. Ensure you link your main points to your earlier work in Project #1 and Project #2. Although three main points is considered ideal, use less or more to fit your project; four main points are shown here for example purposes only. The three projects should be consistent and aligned with Judy “Mac” McNamara’s guidance. 2 Main Point #1 Main Point #2 Main Point #3 Main Point #4 1: OUR BUSINESS CASE 3 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! What are the important factors about the business? What is the CEO’s intent and guidance? How do the first two items relate to the next slides? Example sub-bullet #1 Example sub-bullet #2 Example sub-bullet #3 This is main point #1. Provide no more than six bullets to expand on your topic. Limit each bullet to around six words. This is known as the 6 x 6 rule of presenting. On this slide, you should cover the business case. Think of this as the value to the business that will result from your recommendations. How does your recommendation meet the CEO’s direction and intent? Tell your audience members the what, why, how, and who so that they can make an informed decision about your proposal. If you do not cover these areas adequately, you may not get a decision, you may get a negative decision, or you may be told to come back after you’ve done your due diligence. 3 2: OUR SECURITY POSTURE 4 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! What are the most important vulnerabilities discovered? What is our exposure to known threats? How did you link the results to the business? Transportation industry hit hard by ransomware attacks Example #1: Use your findings and conduct research [1] Example #2: Use your findings and conduct research This is main point #2. Provide no more than six bullets to expand on your topic. Limit each bullet to around six words. This is known as the 6 x 6 rule of presenting. What vulnerabilities did you find in your analysis? What are the most important to tell the CEO about? Why are the vulnerabilities you selected important to the business? Ensure you explain in plain language, not technical jargon or cyber-speak. What are the threats that you see to the business given the scenario? Now consider this simple equation from the uCertify content: risk = threat x vulnerability x impact Use the equation to effectively explain your findings. If you find yourself struggling to quantify a vulnerability, return to this equation. Are there identified and specific threats to MERCURY USA? Avoid generic threats and using fear as a motivator. Is there a vulnerability from your analysis that can be linked to the specific threat? What is the potential impact in not addressing the threat (e.g., cost, reputational, loss of jobs, damage to hardware and software, etc.). 4 James Brocker (JB) - [@Andrew Rider] [@Jessica McCarty] Not sure I understand the first bullet point. Looks like something is missing. James Brocker (JB) - [@John Galliano] Can you review? John Galliano (JG) - Sorry for that, Team. Looks like a stray-click & delete. Fixed! 3: OUR VM PROCESS 5 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! This is main point #3. Provide no more than six bullets to expand on your topic. Limit each bullet to around six words. This is known as the 6 x 6 rule of presenting. This slide includes an example graphic. 5 A B C D E F 4A: WE NEED A GOOD SCANNER 6 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! Reviewed scanners is recommended due to several factors Sub-bullet #1 Sub-bullet #2 Sub-bullet #3 Sub-bullet #4 This is main point #4. Provide no more than six bullets to expand on your topic. Limit each bullet to around six words. This is known as the 6 x 6 rule of presenting. Provide your logic in recommending a scanning tool. What process did you use to evaluate the scanning tools? What tool are you recommending? Provide at least three sub-bullets to support your recommendation. 6 4B: THE ASK 7 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! Lead-in bullet Sub-bullet #1 Purchase : Cost Manpower Measures of success This is main point #4 continued. Provide no more than six bullets to expand on your topic. Limit each bullet to around six words. This is known as the 6 x 6 rule of presenting. Now give the specifics of your ask to the executive decision maker. What are you asking for? How much will it cost? Who will implement it, and will additional manpower be required? What about training? How will you measure success? 7 SUMMARY 8 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! Main Point 1 Main Point 2 Main Point 3 Main Point 4 This is your summary and your last opportunity to connect with your audience. Do not merely repeat your agenda topics. Add one to two important details about each main point to review for your audience. Ensure you re-state why you are giving this pitch: What is the decision you want? What is/are the main takeaway(s)? 8 EXECUTIVE DISCUSSION & QUESTIONS The obligatory questions slide. In this scenario, it is highly likely for open discussion to occur among the executives present and other stakeholders, and you will field questions. A narration for this slide is not required. 9 [1] A