CMGTCB559 Competency 2 Reflection
CMGTCB559 Competency 2 Reflection
1.
Once your faculty marks this activity as complete in the gradebook, the Competency
Assessment will open for you to submit.
Note: A reflection paper is your chance to add your thoughts and analysis to what
you have read and experienced and is meant to illustrate your understanding of
the material and how it affects your ideas and possible practice in the future.
Common Goal of Mitigating Risks: Both risk management and regulatory compliance
aim to reduce organizational hazards (Marchetti, 2021). Risk management involves detecting,
assessing, and resolving risks that could affect the organization's goals, while regulatory
compliance involves following laws, regulations, and standards to avoid legal and financial
penalties.
requirements, which are used to identify risks. For instance, data security legislation may
require the organization to assess data breach risk and apply security measures.
Differences:
Focus and Scope: Risk management includes detecting and managing all sorts of
compliance involves following the organization's industry and operations' laws and
regulations. For instance, the financial institution must follow industry-specific AML
requirements.
interests. In contrast, organizations must follow regulations and norms by law. Legal
sanctions and reputational damage might come from noncompliance. Risk management and
regulatory compliance influence risk mitigation plan development in the selected financial
institution. The company must assess its risk appetite and vulnerabilities and comply with
Apart from regulatory compliance, there are other forms of compliance that influence
risk mitigation plan development in this organization: Internal Policies and Standards: The
financial institution has internal policies and standards that guide its activities. These policies
promote ethics, transparency, and uniformity. Aligning risk management techniques with
internal policies helps the company avoid noncompliance and retain integrity. International
Standards: Effective risk management is supported by international standards like ISO 27001
for information security management. These standards boost the organization's credibility and
multinational financial institution with complicated security and compliance needs. They both
mitigate hazards, but their aim, breadth, and required nature differ. The organization's risk
mitigation plan also depends on internal policies and international norms. Harmonizing these
components helps the organization negotiate risk and compliance, protect operations, and
patient data, ensuring regulatory compliance, and maintaining operational continuity. The
company handles sensitive medical, financial, and personal data, making confidentiality,
integrity, and availability crucial. The programme reduces data breaches, unauthorized access,
and crucial service outages (Whitman, 2021). The multi-step process begins with a rigorous
Following the evaluation, specific policies and procedures are created to handle threats.
In the organization, the Chief Information Security Officer leads the information
security program's development. CISOs are senior executives with cybersecurity, risk
management, and IT knowledge. This person creates and implements the company's
information security strategy, ensuring it meets corporate goals and industry standards. The
CISO works with IT, legal, compliance, and senior management to establish a holistic and
organization's security, assessing new risks, and adjusting security measures as needed. The
senior leadership and the board of directors ensures that information security remains a top
priority and that resource allocation, risk tolerance, and policy implementation are influenced
by cybersecurity. This strategy ensures that the company stays ahead of security threats and
Regular training, workshops, and awareness campaigns will teach staff of the
information security program's policies. These programs will teach staff about information
security, hazards, and best practices. Clear policy documentation will be available on internal
platforms for reference. Regular email updates on security threats and practices will reinforce
training. Role-based access controls impose least privilege, and monitoring detects
disciplinary consequences for non-compliance. An internal reporting system lets staff report
security incidents quickly. Continuous monitoring, audits, and policy deviation investigations
will enforce. Technical protections and access controls limit unauthorized access. Security
advocates in many departments will assist the CISO and security team in enforcement.
Through technical solutions, training, and prompt reporting, the organization will promote
outcomes that gauge its effectiveness in safeguarding data and systems. Key measurements
include the reduction of security incidents, which signifies improved defenses against
breaches and unauthorized access. Adherence to industry regulations and standards
incidents in a timely manner highlights its robustness. Furthermore, the ability to proactively
adaptability.
A good information security programme must meet several essential needs. Starting
with rigorous and continuous risk assessments that identify weaknesses and threats. The basis
is clear policy and procedure documentation customized to the organization's risks and
compliance needs. Firewalls, encryption, and access management strengthen defenses, while
personnel training reinforces security practices. Commitment, resources, and corporate goals
are essential from executive leadership. System and network monitoring detects threats
quickly, while a well-defined incident response plan prepares the organization for breaches.
Following laws, rules, and industry standards prevents legal and financial issues. Effective
learning.