9.5 Mobilizing organizational resources for priority III

 < Day Day Up > 



Action Checklist Number 9 (see Table 9.1) shows which steps IT managers in all types of organizations can take to synchronize their efforts with those of the government to achieve the goals of participating in a national cyberspace security awareness and training program. The next chapter focuses on working to secure governments' cyberspace.

Table 9.1: Action Checklist Number 9

Action Item

Status (e.g., Completed, Pending, or N/A)

Develop and launch a technology-focused cybersecurity training program for various types of employees, including executives, managers, supervisors, project leaders, and end users in all capacities.

 

Develop and launch an information security-focused training program for different types of employees based on their levels and areas of responsibilities.

 

Evaluate the need for certified computer security professionals in the organization and determine a course of action to increase the level of certification of in-house staff.

 



 < Day Day Up > 



Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net