Charlie Moody called the meeting to order. The conference room wasfull of developers, systems analys

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.

Order a Similar Paper Order a Different Paper

Charlie Moody called the meeting to order. The conference room wasfull of developers, systems analysts, IT managers, business users, and busi-ness managers.”All right everyone, let’s get started. Welcome to the kick-off meeting ofthe Sequential Label and Supply Information Security Task Force. That’s thename of our new project team, and we’re here today to talk about ourobjectives and to review the initial work plan.””Why are all of the users here?” asked the manager of sales. “Isn’t secur-ity a problem for the IT Department?”Charlie explained, “Well, that used to be the case, but we’ve come to real-ize that information security is about managing the risk of using auto-mated systems, which involves almost everyone in the company. In orderto make our systems more secure, we will need the participation of peoplefrom all departments.”Charlie continued, “1 hope everyone has read the packets we sent outlast week with the legal requirements we face in our industry and thebackground articles on threats and attacks. Today we’ll begin the processof identifying and classifying all of the information technology risks thatface our organization. This includes everything from fires and floods thatcould disrupt our business to criminal hackers who might try to steal ordestroy our data. Once we identify and classify the risks facing our assets,we can discuss how to reduce or eliminate these risks by establishing con-trols. Which controls we actually apply will depend on the costs and ben-efits of each control.””Wow, Charlie!” said Amy Windahl from the back of the room. “I’m surewe need to do it-I was hit by the last attack, just as everyone here was-but we have hundreds of systems.””It’s more like thousands,” said Charlie. He went on, “That’s why wehave so many people on this team and why the team includes members ofevery department.”Charlie continued, “Okay, everyone, please open your packets and takeout the project plan with the work list showing teams, tasks, and schedules.Any questions before we start reviewing the work plan?”As Charlie wrapped up the meeting, he ticked off a few key remindersfor everyone involved in the asset identification project.”Okay, everyone, before we finish, please remember that you should tryto make your asset lists complete, but be sure to focus your attention onthe more valuable assets first. Also, remember that we evaluate our assetsbased on business impact to profitability first, and then economic cost ofreplacement. Make sure you check with me about any questions that comeup. We will schedule our next meeting in two weeks, so please have yourdraft inventories ready.”1. Did Charlie effectively organize the work before the meeting? Why orwhy not? Make a list of the important issues you think should becovered by the work plan. For each issue, provide a short explanation.2. Will the company get useful information from the team it has assem-bled? Why or why not?3. Why might some attendees resist the goals of the meeting?Does it seem that each person invited was briefed on the importance of theevent and the issues behind it?