Research Analyses, Presentation and Executive Report
Important Dates:
May 10th- Students are expected to form a group of 3-4 members and give the team member names.
May 27th- Submit the Topic of your group Research Project- Name of the Organisation and breach identified.
June 10th- Submit draft/outline for the research project.
Learning Objectives:
- To related the IT risks and controls framework you‘ve learned to real life cybersecurity breaches when adequate controls are not implemented to protect companies.
- To take the lessons learned from the research to apply to your current or future jobs.
- To learn how to deliver presentations to corporate Executives
Students will paired up in groups to perform in-depth research analysis of current” Information Technology Security Breach” topics. Present the results of their research during weeks noted in the “Schedule Summary” below and turn in an executive report of the research analysis. Students will submit a proposal for the topics during week two of the semester and provide periodic updates to their research analysis every 3 week subsequent. Final presentation will comprise of a PowerPoint presentation and an executive report not to exceed 4 pages following the format outlined below. The research analysis, presentation and executive report will be grated using the criteria and guideline noted in the class rubric. The research scenario is that the Executives wants to know how to fix the IT Security breach to ensure that they have appropriate governance and controls in place to prevent IT security incidents in the future. Researched topic must be approved by the professor prior to execution.
Research Presentation Format:
1. Executive Summary must describe:
a) What was the event or cyber breach?
b) How did it happen?
c) When did it happen?
d) Who was involved?
e) Why did it happen?
f) What was the impact and risks?
g) What is the loss exposure (money, reputation, market share, customer data, etc.)?
h) What did the company do to remediate the situation?
i) How much did it cost the company to remedial the event?
2. Based on what you’ve learned about Information Security, what are your conclusions and recommendations to the company to prevent future breach?
3. Be creative in the presentation and use whatever is necessary (preso, video, demo, simulate, etc) to sale your point and convince management to do what you recommend.