When building an information security framework, it is important to note who is affected by the effectiveness of that framework. Discuss the typical stakeholder hierarchy in a company with less than 1000 total personnel, and describe the positions they might hold, along with how you think they may be affected during a data catastrophe such as a data breach.
Attempt Start Date: 10-Sep-2020 at 12:00:00 AM
Due Date: 12-Sep-2020 at 11:59:59 PM
Maximum Points: 5.0
Stakeholders come in many forms, and thus play a different role within their given domain of responsibility. It is important to understand who does what when it comes to an effective cybersecurity environment. Discuss the roles and responsibilities of at least three personnel types that you know of that would actively be resident in a cybersecurity environment.