SCC Strategic Planning Phases Project


Assignment ContentAs the newly hired chief information security officer (CISO), you are tasked with developing the Best Care Community (BCC) hospital’s information security program. There is no information security program in place, and your first task is to create the enterprise information security strategy that encompasses the company’s mission, goals, and objectives, as well as appropriately reflects the risk tolerance and risk appetite of the company as a whole.Review the Best Care Community Profile for Development of the Information Security Program to become familiar with the mission of the hospital.This week you will complete the first steps of the initiative to develop the BCC enterprise information security strategy.Part 1Create a 14- to 16-slide Microsoft® PowerPoint® informative presentation for the BCC leadership in which you:Describe the three phases of strategic planning.Diagram the three strategic planning phases with each of the five information security tasks as outlined in the BCC profile, mapping each to its respective strategic planning phase.Describe the balanced scorecard domains.Map the BCC business objectives into the appropriate balanced scorecard domains.Recommend a prioritized list of BCC information security objectives mapped to the business objectives.Map the BCC information security objectives into the appropriate balanced scorecard domains in a matrix format that depicts the objectives and initiatives.Include a title slide.Note: There will be two balanced scorecard sets: one for the business objectives and one for the information security objectives. The BCC BSC Scorecard Template provides a template for the scorecards in each domain. You will need to duplicate and label the scorecard slides in the template to create two sets of balanced scorecards, as well as add appropriate slides for the additional required content.Part 2Write a 2- to 3-page report that recommends one of the enterprise control frameworks. Your report should: Describe your chosen enterprise architecture framework.Determine how the business objectives correspond to the information security strategic objectives.Explain how the enterprise architecture framework can be used to achieve business and information security alignment.

We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.