Your policies need high visibility to be effective. When implementing policies, you can use various methods to spread the word throughout your organization. Use management presentations, videos, panel discussions, guest speakers, and road shows, in a manner that ensures that management's support is clear, especially where employees feel overwhelmed with policies, directives, guidelines, and procedures
Based on the case study or the Case Study on Page 168 of your text, write a 3 – 6 page paper to include the below information:
- Assign roles and responsibilities for employees at varying levels in the corporate hierarchy that are responsible for security policies.
- Analyze risk assessment and risk mitigation strategies and policy needs based on best practices
- Summarize your findings
Include proper APA citations for any references you use in your research. Ensure you have proper spelling, grammar, and mechanics throughout your writing.
The Information Technology Infrastructure Library (ITIL) includes five books that represent the ITIL life cycle. A central part of ITIL, is Service Transition. This relates to the transition of services into production. It includes configuration management and change management. Discuss how you would use ITIL enhance you organization’s security pposture.