<div class=””>
<div id=”:9lx”>Discussion Requirements</div>
<div id=”:4bf” class=”ii gt”>
<div id=”:9mi” class=”a3s aXjCH “>
<div dir=”ltr”>What type of support services should be available when an incident occurs?
Are the same or different support services available when an incident impacts the <a href=”https://www.homeworkgain.com/downloads/review-the-chapters/”>operational performance</a> of an organization?
Discuss various ways to use support services when an incident occurs.Additional details related to this week topics
WEEK 13 LEARNING OBJECTIVES
Lesson 13: <a href=”https://www.homeworkgain.com/downloads/building-and-implementing-a-successful-cybersecurity-policy/”>IT Security Policy</a> Implementations
Learning Objective
<ul>
<li>Describe issues related to implementing ISS policies.</li>
</ul>
Key Concepts
<ul>
<li>Organizational implementation issues for ISS policies</li>
<li>Differences between public and private IT security policy implementations</li>
<li>Hindrances to the dissemination of policies</li>
<li>Development and implementation strategies for security awareness policies</li>
</ul>
Reading
Review the Required Readings assigned for this lesson from your textbook, <i>Security Policies and Implementation Issues</i>, 2nd edition:
<ul>
<li>Chapter 13: “IT Security Policy Implementations”</li>
</ul>
Keywords
Use the following keywords to search for additional materials to support your work:
<ul>
<li>Dissemination of Policies</li>
<li>Executive Management Support/Sponsorship</li>
<li>Implementation Issues</li>
<li>Nontechnical Hindrances</li>
<li>Organizational Challenges</li>
<li>Organizational Cultural Change</li>
<li>Technical Hindrances</li>
</ul>
<h2>Lesson 14: IT Security Policy Enforcement</h2>
Learning Objective
<ul>
<li>Describe issues related to enforcing ISS policies.</li>
</ul>
Key Concepts
<ul>
<li>Organizational monitoring and enforcement of ISS policies</li>
<li>Policy enforcement as it relates to compliance laws</li>
<li>Legal implications of ISS policy enforcement</li>
</ul>
Reading
Review the Required Readings assigned for this lesson from your textbook, <i>Security Policies and Implementation Issues</i>, 2nd edition:
<ul>
<li>Chapter 14: “IT Security Policy Enforcement”</li>
</ul>
Keywords
Use the following keywords to search for additional materials to support your work:
<ul>
<li>Automated Security Controls</li>
<li>Compliance Committee</li>
<li>Compliance Laws</li>
<li>Enforcement Strategies</li>
<li>Executive Management Support/Sponsorship</li>
<li>Operational Risk Committee</li>
<li>Policy Monitoring</li>
<li>Security Policy Enforcement</li>
</ul>
</div>
</div>
</div>
</div>
<a href=”https://www.homeworkgain.com/wp-content/uploads/edd/2020/07/20200330225515policy_ppt15_l14_1_.pptx”>20200330225515policy_ppt15_l14_1_</a>
<a href=”https://www.homeworkgain.com/wp-content/uploads/edd/2020/07/20200330225517policy_ppt15_l13_1_.pptx”>20200330225517policy_ppt15_l13_1_</a>