Verified Document

Speech Preparation For Security Professionals Essay

Preparing for a Speech before a Security Professional Introduction

ASIS International consists of worldwide conglomeration of experts in safety and security matters who all have the responsibility to ensure that any resource under their jurisdiction is safeguarded, be it human beings, facilities as well as sets of data. ASIS International came into existence in 1955 and all the stakeholders are proficient to serve in all types of industries ranging from state-controlled enterprises, individually owned enterprises as well as enterprises of different scopes. ASIS takes into account the importance of workplace diversity and globalization.

This is seen in the occupants of different positions such as junior administrators, Chief Security Officer, Chief Executive Officer, retirees in the security sector, security experts offering professional advice as well as anyone who is on the road to career change who are all diversified. Annually, ASIS International is involved in hosting the 4-day ASIS International Seminar and Exhibits in various nations. The main purpose of this forum is to display the newest ideas on amenities, computer systems terrain, functional and human resources found in diverse sectors like the computer programming, Information Technology and sectors in the safety and protection fields (ASIS International, n.d.).

Functional Issues and Resolutions

With the increase of computer networks attacks like APTs and cyber spying as well as innovative networks like Internet of Things (IoT), an evolving uncharted territory in which intangible innovations of the human mind are stolen for money has taken over the initial trends of attacks on computer networking systems. Institutions can only curb these attacks by employing strategic tactics in safeguarding Information Technology. Like what we will see later on in this presentation, implementing straightforward guidelines in handling security as well as executing safety measures from experts will go a long way in curbing the attacks. For starters, it is imperative...

These include the ISO 27000 as well as the Control Objectives for Information and Related Technologies (CoBit). Carry out a threat assessment by following the mentioned frameworks to establish the level of effectiveness in your enterprise’s safety models in comparison to those found in the worldwide frameworks (Tillyard, 2018).
Enterprises which conform to the existing legal frameworks like: NIST, PCL, GLBA, FISSMA, HITECH and GDPR in addition to benchmarked ways of doing things have to contend with the resulting consequences and the immense effect felt in the particular sector or where the enterprise...…and communication equipment. (Tipton & Nozaki, 2007).

Relevance of In-house and Outer Interrelations

Studies indicate that the level of attachment between the safety experts and security systems will determine how effective the frameworks are. This attachment creates diverse links which facilitate effective methods of handling security. This attachment is drawn from involving inhouse interested parties who work in other departments within your enterprise as well as policy makers within your enterprise. On the outside, these attachments are formed by sharing and exchanging resources as well as ideas with executives of diverse sectors. Networking between private and state-owned industries guarantees the ability to maintain crucial functions of a business during and after possible threats occur. It facilitates prompt support from private entities during a crisis, thus leading to successful threat management. (Hu, Hart, & Cooke, 2007).

Remarks

I take this opportunity to thank you for your active involvement during this presentation. Your insightful contributions made as we grapple with the numerous security concerns as well as ways to resolve those issues is highly appreciated. We have noted down all considerations which the ISIS International will execute promptly. The floor is now open for any queries.

Sources used in this document:

References

ASIS International. (n.d.). About ASIS. Retrieved February 20, 2019, from https://www.asisonline.org/footer-pages/about-asis/

Hu, Q., Hart, P., & Cooke, D. (2007). The role of external and internal influences on information systems security–a neo-institutional perspective. The Journal of Strategic Information Systems, 16(2), 153-172.

Tillyard, J. (2018, March 21). The Top 5 Challenges Faced by Security Operations Centers. Retrieved February 20, 2019, from https://www.dflabs.com/blog/the-top-5-challenges-faced-by-security-operations-centers/

Tipton, H. F., & Nozaki, M. K. (2007). Information security management handbook. CRC press.


Cite this Document:
Copy Bibliography Citation

Related Documents

Students With Disabilities Who Did
Words: 17241 Length: 60 Document Type: Dissertation

The shift toward standardized testing has failed to result in a meaningful reduction of high school dropout rates, and students with disabilities continue to be marginalized by the culture of testing in public education (Dynarski et al., 2008). With that said, the needs of students with specific educational challenges are diverse and complex, and the solutions to their needs are not revealed in the results of standardized testing (Crawford &

Disability Rights Movement and How It Affected Employment
Words: 3063 Length: 10 Document Type: Research Paper

Disability Rights Movement and How it Affected Employment According to the oxford advanced leaner's dictionary disability is the state of being disabled or lack of something that is considered necessary, disabilities could be of sight, hearing, speech and diseases among others. Baron (2002, 585-599) in his studies gave a broader definition of disability in which he termed it as a complex phenomena that reflects on the interaction between the physical body

H-1B Shortage in Today's Society,
Words: 10207 Length: 35 Document Type: Research Proposal

To protect themselves, many Americans chose to avoid working with or becoming friends with those who immigrated. A lack of trust permeated everything that the Americans did in regards to the immigrants, at least with the men. This was not always true of the women, as they often got along together and shared the trials and difficulties of raising families. However, many men who owned shops and stores would not

Nursing Education
Words: 10931 Length: 40 Document Type: Term Paper

Cross-Sectional Study to Determine Factors in the Educational Advancement of the Licensed Practical Nurse to the Registered Nurse in the State of North Carolina According to the Harvard Nursing Research Institute, United States nursing school enrollments dropped by 20.9% from 1995 to 1998 (Healthcare Review, 2000). Behind headlines such as this one are the overwhelming issues which threaten the nursing workforce: 1) staffing cuts, 2) mandatory overtime, and 3) the

Special Education Teachers Analysis Scope,
Words: 14451 Length: 53 Document Type: Term Paper

This qualitative research uses a Delphi study to explore the perceptions of special education teachers regarding retention. This Delphi study includes twenty-five to thirty special education teachers of K-12 in two California districts of less than 40,000 students. The information gathered provides leaders in the field with successful practices in retaining special education teachers. Purpose of the study The primary purpose of this study is to explore the perceptions of special education

Tablet Devices Replace the Latop
Words: 16026 Length: 55 Document Type: Dissertation

It initially failed to attract the desired audience, but it is believed that the recent innovations of the re-launched tablet PC would ensure its success (Search Mobile Computing, 2010). While Apple stated that they were the first creators of tablet computers, Microsoft comes to argue the same. Thorn Holwerda (2010) however states that neither of the two it monoliths were the creator of tablet PC. "Well, no. They're both wrong.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now