Preview

Gregg Shafel Case Summary

Good Essays
Open Document
Open Document
422 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gregg Shafel Case Summary
If I had the opportunity to advise Gregg Steinhafel and Target on actions to take to better handle a crisis like the cyber attack they experienced in 2013 I would focus on policy and training development. It seemed alarming to me that a CEO and his top executives disagreed on the best strategy and moved forward without reaching a consensus (Kinicki, 2016). Discrepancies between team members, especially at such a high level, would indicate to me an inconsistent or poorly established culture. Identifying the company's actual values and goals is imperative to then detail the ethical standards, proper course of action, appropriate communications, and resulting training (LeClair, 2000). Establishing these policies would lead to standard expectations in behavior and choices, and uniform culture (LeClair, 2000). …show more content…

Technology innovation and global competition are two essential aspects of modern business, as a result companies invest a great deal in these areas (LeClair, 2000). It is imperative for senior management, like Steinhafel and his senior managers, to identify the information important to their business and which information is most valuable so that they can develop an IT infrastructure to protect those assets and then educate, inform, and train employees in a way that fosters a culture in which security is a priority (Dutta, 2002). With planning, innovation, and training a company can face the ever changing threats of the cyber world with increased confidence and thereby gain the confidence and business of their customers (Dutta,

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Dave Sharland – Mr. Sharland a physical therapist for the North Florida/South Georgia Veteran’s Administration (VA) reported that during his career, he has participated in over 800 physical therapy visits in home settings and been very positive. The Council questioned Mr. Sharland on licensure requirements, technical platform, types of services offered, and patient and patient representative access to services. Mr. Sharland to explain the health care providers working with the VA are only required to obtain a license in one state, but they are limited to providing services to only VA patients. He noted that that necessary technology is sometimes provided directly to patients and that in other instances the patient is responsible for purchasing…

    • 226 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Liaskos, J., & Sandy, G. A. (2004). An evaluation of Internet use policies of Victorian local…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The omission of the judicial review power in the US constitution in the text has triggered a huge debate from the diverse fronts. It is imperative to comprehend that the United States constitution makers, despite not incorporating the judicial review power in text form in the US constitution; they actually implied the judicial review power in the constitution. This implies that this power is not direct but rather implied and ought to be practiced. The United States` Supremacy Clause contained in the constitution sensitively states that there exists a judicial review form. This clause states that the US constitution as well as the United States laws that will be passed in accordance thereof; together with all the treaties that shall be signed…

    • 195 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    In the IT sector especially, employers seek future employees with a wide knowledge of security systems and basic knowledge of how to keep safe on the internet. This says that you would know what you are doing while using the internet and can handle the maintenance needed to keep a computer safe and up to date while using a variety of software. In addition this will mean that you are very aware of issues and threats which can make you a…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Nothing

    • 634 Words
    • 4 Pages

    To integrate the professional qualification, skills and work experience in security administration and Information Technology with my personal interest and drive in the emerging concepts of security administration and Information Technology for a challenging and enriching journey ultimately leading to the value addition to the organizational goals.…

    • 634 Words
    • 4 Pages
    Satisfactory Essays