Computer Science Homework Help

CMIT 421 University of Maryland Global Campus Cyber Security Question

 

This week, you will make your PowerPoint presentation with narrated audio, making the case for your vulnerability management process and that the company to purchase the vulnerability management software, Nessus. With the current buzz about the ransomware attack on a rival company, key Mercury USA stakeholders are concerned that this type of attack could lead to a significant loss of revenue for the company as well as damage to the company’s reputation.

They are looking for your guidance and technical expertise to not only come up with a better way to protect their resource but also to make them feel confident that they can calm stockholders’ fears about any ransomware or cyberattacks. You need to provide the stakeholders with a presentation that relays the technical information in a way they can understand so they can make an informed decision about your vulnerability management process and your recommendation to purchase cybersecurity software.

The ransomware attack has made your company realize that cybersecurity cannot be an afterthought. The stakeholders are aware that if they don’t spend money on addressing issues now, a cyber incident might lead to a more costly bill in the future and could even threaten the very existence of the company.

Project 3: Presentation to Management

Turnitin® enabledThis assignment will be submitted to Turnitin®.

Remember to be clear about what action you are recommending. Executive management will want to understand not only what you discovered, but also what you propose as a solution. The company’s leaders will want to know what decisions they need to make based on your findings. Give them the actionable information they need to decide.

You may want to review these presentation resources (attached) to help you with your narrated presentation. You will provide voice annotation for all slides in the following format:

  • five to 10 slides maximum; limit bullets to no more than six per slide
  • voice annotation for every slide (excluding the reference slide)
  • a reference slide with one to two quality sources

How Will My Work Be Evaluated?

As you progress in your cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. By summarizing your results and recommendations to management in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your recommendations to provide information for decision makers in a format that uses the right mix of technical detail in a business context is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
  • 2.1.3: Explain the significance of the issue or problem.
  • 12.3.2: Describe the implementation of controls.
  • 12.8.1: Recognize the process to obtain approval from the business process owner.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

If you haven’t already downloaded it last week, download the Presentation to Management Template (attached) now and follow the instructions in the document.

Remember to delete the instructional text from the template before you submit.

When you are finished, click “add a file” to upload your work, then click the Submit button.