– Prepare a SWOT Analysis Table ( see attached sample)
– Plan People, Process, and Data Governance Issues ( 2-3 pages)
– 3 PPT slide
Step: Prepare a SWOT Analysis Table
The area that the SWOT analysis will focus are as follows:
Internet of things (IoT)
big data analytics
You’ve identified the technologies and devices, and listed the goals and objectives for their use in the organization. In this step, you will justify adding these devices and technologies to the network infrastructure.
In order to do this, perform a strengths, weaknesses, opportunities, and threats (SWOT) analysis of each device/technology being introduced into the infrastructure. A SWOT analysis is a framework that allows you to identify internal and external factors that can affect the implementation of new technology. Such a process can be helpful for decision making and strategic planning.
Look at internal and external factors that could influence the successful introduction with respect to the company specific business model and operations. Internal factors are the strengths and weaknesses you found. External factors are the opportunities and threats identified during the SWOT analysis. Determine what these are. Address the following questions in your discussion:
- How do they influence the operation and maintenance of the network?
- What can be done to overcome these factors?
As cybersecurity professionals, you and your team members should stress security- related analysis and create a SWOT chart that includes internal and external factors.
This chart and the overall analysis should be a significant part of the Strategic Technology Plan for Data Loss Prevention.
In the next step, you and your team members will consider any issues that might come up when you integrate and implement the new devices and technologies.
Step 7: Plan People, Process, and Data Governance Issues
You and your team have completed the lab where you updated the company’s data-flow chart with the various systems. In this step, you will consider some overall issues for implementation. People, process, and data governance is often one of the most important aspects of deploying technology. During this step, think about what processes might already be in place and what changes will be required by the introduction of the new devices and technologies. Think of governance, personnel changes, hiring, and training requirements for users and systems administrators. Determine any gaps or shortcomings that will need to be addressed now or in the future. Think of what accommodations are needed to handle the new technology being deployed in the network.