The power point below shows step-by-step how to create an outline. Please start the outlining form in sections 4, 5 and 6, slides 45–61. The subject of the project plan is Chase Bank. It should be similar to the document below, titled “Annotated Outline.”Also, follow these requierments4.1 Highest Prioritized RisksThe section identifies the top 3 risks that you are planning to mitigate in Section 5. Two out of your three risks must address the specific risks that may arise out of the “Situation as You Briefed the BOD and Executive Management” Slide 12 from the Enterprise Information Security Program Plan Project assignment presentation.Each risk must have the following items included with each risk:• Asset(s) potentially affected• Threat or threat actors• Vulnerability(ies)• Impact if realized• Time period that you believe risk remains active.Use Group results from risk exercise as a starting point.The resulting risk statement must be in the form of a risk statement-Module 6’s “Risk Exercise will demonstrate how this can be done and what is expected.Note: This is not meant to be a risk equation, but an understanding of the basic components of the risks that you have identified and how to craft a risk statement1.1.1 Risk 1This section will identify Risk 1. It will be in the form of a risk statement. The associated items listed above will be addressed.1.1.1.1 Asset(s) potentially affectedThis section will identify the asset(s) potentially affected by Risk 1.1.1.1.2 Threat or threat actorsThis section will identify the treat or threat actors associated with Risk 1.1.1.1.3 Vulnerability(ies)This section will identify any vulnerabilities associated with Risk 1.1.1.1.4 Impact if realizedThis section will identify the impact if realized of Risk 1. The impact should tie back to the business being able to achieve its Strategic, Operational, or Tactical objectives.1.1.1.5 Time periodThis section will identify the time period that we believe Risk 1 will remain active.1.1.2 Risk 2This section will identify Risk 2. It will be in the form of a risk statement. The associated items listed above will be addressed.1.1.2.1 Asset(s) potentially affectedThis section will identify the asset(s) potentially affected by Risk 2.1.1.2.2 Threat or threat actorsThis section will identify the treat or threat actors associated with Risk 2.1.1.2.3 Vulnerability(ies)This section will identify any vulnerabilities associated with Risk 2.1.1.2.4 Impact if realizedThis section will identify the impact if realized of Risk 2. The impact should tie back to the business being able to achieve its Strategic, Operational, or Tactical objectives.1.1.2.5 Time periodThis section will identify the time period that we believe Risk 2 will remain active.1.1.3 Risk 3This section will identify Risk 3. It will be in the form of a risk statement. The associated items listed above will be addressed.1.1.3.1 Asset(s) potentially affectedThis section will identify the asset(s) potentially affected by Risk 3.1.1.3.2 Threat or threat actorsThis section will identify the treat or threat actors associated with Risk 3.1.1.3.3 Vulnerability(ies)This section will identify any vulnerabilities associated with Risk 3.1.1.3.4 Impact if realizedThis section will identify the impact if realized of Risk 3. The impact should tie back to the business being able to achieve its Strategic, Operational, or Tactical objectives.1.1.3.5 Time periodThis section will identify the time period that we believe Risk 3 will remain active.5 Information Security Policies, Procedures, Standards, or ProcessesThis section will prioritize listed on Project Plan Assignment using a scale from 1-10 (1 being the highest and 10 being the lowest) and state why our team rated each item the way we did demonstrating a risk-based approach given scare resources for those items listed on Project Plan Assignment. write a summary for this section6 Information Security ProgramsThis section needs to address what are the top 4 programs that you as the CISO are to execute within the first 6 months to year with possible identification of additional programs required to execute an effective information security program that counters the identified risks in the Information Security Section. You can include more than 4 program if you wish, but only the first 4 will be graded.There is an alternative means in grouping risks rather than having them identified in each program, and that approach will be discussed during the programs lab exercise in Module 7.3.1 Program 1Name your first program in place of Program 13.1.1 What risk(s) stated in the Information Security Section are you addressing with this proposed programThis section identifies which risk(s) from section 4.12 you are addressing with your identified Program 13.1.2 Why you are initiating/doing this programThis section answers why you are doing your selected program as it provides context as to how you are addressing the risk(s) identified above.3.1.3 What you are going to do within the programThis section provides sufficient detail as to what you are doing in your program. It is expected that this section could contain several (more than two) paragraphs detailing what you are going to do. This section does not have to be a book, but should provide sufficient information that one can understand what you are attempting to do. Each paragraph should be between 6-8 sentences in length.3.1.4 What are your expected outcomes and how are you measuring these expected outcomesThis section identifies what are your expected outcomes and how you are going to measure them. There should be at least 3 measurable items.3.1.5 What is your timeline for implementationThis section provides an implementation time line as to how long this program will last or it may be a start of a series of programs that will build a capability.

QUALITY: 100% ORIGINAL – NO PLAGIARISM

(USA, AUS, UK & CA PhD. Writers)

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS

The Best Custom Essay Writing Service

About Our Service

We are an online academic writing company that connects talented freelance writers with students in need of their services. Unlike other writing companies, our team is made up of native English speakers from countries such as the USA, UK, Canada, Australia, Ireland, and New Zealand.

Qualified Writers

Our Guarantees:

CLICK TO SUBMIT YOUR ORDER