Discussions of threats which could impact
confidentiality
Discussions of threats which could impact confidentiality
More and more hiring actions start with a written essay from job
candidates followed by a telephone “screening” interview. For this
week’s discussion topic, you will take on the role of an applicant
for an internship in a CISO organization. You are at the first stage in
the application process — writing the essay. Your assigned topic is:
Why should a large company (>1000 employees) adopt the NIST
Risk Management Framework to manage IT risks?
The application review committee is a group of managers (both
technical and non-technical) who depend upon IT security to
protect their business operations (including intellectual property,
company strategic and financial information, and customer data).
The purpose of the essay is two fold. First, the review committee
is looking for the ability to think critically and analyze a relevant
problem, in this case, the business need for a risk management
framework and risk management program. Second, the review
committee is looking for applicants who can communicate
effectively in writing for both technical and non-technical
audiences.
Write a 3 to 5 paragraph application essay that addresses the
points listed below and which responds fully to the required topic.

——-

Threats to secrecy are being discussed.

Threats to secrecy are being discussed.

More and more hiring processes begin with a written essay from the job applicant.

prospects, followed by a “screening” interview over the phone Because of this,

You will play the role of a candidate in this week’s conversation subject.

for a position as an intern in a CISO organization You are in the initial stages of

The application process entails drafting an essay. Your assigned topic is:

Why should a large company (>1000 employees) adopt the NIST

Risk Management Framework to manage IT risks?

The application review committee is a group of managers (both

technical and non-technical) who depend upon IT security to

protect their business operations (including intellectual property,

company strategic and financial information, and customer data).

The purpose of

Published by
Essays
View all posts