Preview

Case Study: EKMS Immediate Supervisor In Command

Satisfactory Essays
Open Document
Open Document
165 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study: EKMS Immediate Supervisor In Command
Submitted upon Ensign Tooman's transfer to USS CARL VINSON (CVN-70).

**UP AND COMING IP OFFICER WITH UNLIMITED POTENTIAL!!**
-PLANNER ORIENTATED. As EKMS Manager, he conducted 20 Spot Checks, two self-assessments, three base-wide inventories managing four local elements, 450 pieces of cryptographic material, ensuring 100% accountability and compliance. His organization and planning were critical in the preparation for the 2016 EKMS Immediate Supervisor In Command (ISIC) inspection.
-RESULTS DRIVEN. As Security Manager, he supervised three quarterly Cyber Security spot checks covering 14 secure spaces between 11 tenant commands island-wide, maintaining compliance of Defense Information Systems Agency's Physical Security posture

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 10 Coast Guard

    • 4261 Words
    • 18 Pages

    A blank indicates that no RAT questions will be asked about this RPQ for that grade. Not all grades…

    • 4261 Words
    • 18 Pages
    Good Essays
  • Satisfactory Essays

    CM intinitally met with MGM and VC at Unveristy Hosptial to discuss the allegatiosn of inaduquate supervision. Ms. Demmons reported that Mrs. Brown gave her Power of Attorney over her and the children. Ms. Demmons reported that Mrs. Brown is still married to Mr. Harold Brown, Jr. (BFa), but that they are separated. Ms. Demmons reported that VC Ja’nyhia and Malachi go over on rotating weekends to visit Mr. Harold Brown, Jr. at his residence where he resides with his father Harold Brown, Sr. Ms. Demmons reported that the alleged maltreator (Ayanna Tyler) lives with Mr. Harold Brown, Jr’s. mother and goes between both homes. Ms. Demmons reported that VC Ja'nyhia is around Ms. Tyler at her paternal grandmother's house and her paternal grandfather's/father…

    • 233 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    C200 Task 1

    • 4180 Words
    • 12 Pages

    The organization chosen is ABE Defense Systems. ABE Defense Systems is a global organization and a premiere defense contractor, specializing in defense, aerospace and cyber security. The organization that will be discussed is the network operations center of ABE Defense Systems. The leader selected is the director of the network operations center. The reason the director of network operations center was selected was to better understand the role and requirements of the position. This is a challenging position, responsible for the oversight and operations of all information technology’s “break and fix” services provided to its customers, the engineers and non-technical employees of ABE Defense Systems.…

    • 4180 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Cjs250 Wk 5 D 7

    • 948 Words
    • 4 Pages

    Contact a security manager and conduct the interview listed in Part I (space has been provided for extra questions, should you ask any). Once the interview has been completed, answer the questions in Part II.…

    • 948 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The review results were positive with a suggestion for an improvement. The team found that RedSeal product provides the intelligence necessary to improve defenses, maintain continuous compliance and mitigate real-world risks by identifying the available paths of access and exposed vulnerabilities present across a network (Stephenson, 2012). The RedSeal solution is either a hardware appliance or software product and is architected for a fast and efficient means of implementing the system (Stephenson, 2012). The design will provide the most secure, scalable, and dependable deployment possible (Stephenson, 2012). Continuous monitoring focuses on correlating IT, network, and vulnerability feeds (Stephenson, 2012). The system identifies risk associated with the business’s security effectiveness as opposed to policy and compliance driven tools (Stephenson, 2012). RedSeal provides a large library of supported vendor products, allowing security and vulnerability data to be quickly and easily imported into the system. The system automatically builds network maps and correlates the map data with configuration and vulnerability data, which creates a threat reference library. RedSeal finds and eliminates gaps in businesses security controls and prioritizes the impact of those gaps. RedSeal is not an assessment or audit tool, but it does correlate risk to various controls for compliance regulations, creating reports that show gaps in deployed configurations/controls (Stephenson, 2012). The team would have liked to have seen more integration with governance, risk, and compliance solutions (Stephenson, 2012). The product only provided a piece of the risk picture. The piece is important, and one that a number of assessment and audit driven tools do not deliver and could leverage (Stephenson,…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Security risk examination should be the first request of business, if this hasn’t been performed in the previous year. There needs to be verification that all regions have been investigated and taken care of from a security standpoint. When you take for granted something you think is immaterial you could end up with a security problem that is paramount, trying to address it then will have you playing catch up.…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Iscm Strategic Plan

    • 1276 Words
    • 6 Pages

    are often requested by organization officials such as the Risk Executive, CIO, CISO, and AO as well as by external Federal entities such as DHS and OMB, because they provide a holistic view of the security posture of the organization and measure the effectiveness of the program. The ISCM Program team will define metrics and security controls that align with their information security goals and identify improvements to the security posture of the systems. Metrics and controls should include security-related information from security status monitoring and security status assessments and support risk-based decision making. Moreover, the measurement and reporting schedule will need to be adjusted accordingly as the program matures and as additional requirements are identified. Current ECMO metrics as outlined in the table below will serve as a starting point. The ISCM integrated project team will continue to develop relevant and measurable metrics that support reporting through an executive level CDM dashboard. Additional information on security controls can be found in Appendix B. The dashboard will summarize security metrics and reporting while continuously providing trend analysis for the organization, and give management the ability to see the progress or regression of a given system within the cybersecurity continuous monitoring…

    • 1276 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Is4550 Week5 Assignment1

    • 282 Words
    • 3 Pages

    your organization as management is thinking about this as a possible response to recent security…

    • 282 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    DHS Overlapping Missions

    • 1187 Words
    • 5 Pages

    The mission set of each and every one of the operational agencies within the U.S. Department of Homeland Security is critical in the overall success of the DHS mission, keeping America free from terrorist activity. The task of protecting our nation against terror is a no-fail mission, and each of the organizations with the DHS has a critical role with their own staff of expert personnel, trained and proficient in a unique set of skills to contribute to this highly important mission. In any organization charged with providing security, it is imperative to ensure there are no gaps in the protection to be provided. Within the Department of Homeland Security this is no different,…

    • 1187 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

     I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays