Chat with us, powered by LiveChat Assignment 8: Building a Cybersecurity Awareness Program for a Nonprofit Organization - Writeden

Imagine you are an Information Security consultant for a nonprofit organization that lacks a dedicated IT department. The organization is concerned about the growing cyber threats and wants to establish a comprehensive cybersecurity awareness program for its employees and volunteers. Write a three to five-page paper in which you:1. Cybersecurity Threat Landscape: Provide an overview of the cybersecurity threat landscape, focusing on common threats faced by nonprofit organizations. Discuss potential risks associated with phishing, social engineering, and malware.2. Tailored Training Content: Design a cybersecurity awareness training program tailored tothe specific needs of nonprofit employees and volunteers. Include topics such as password hygiene, email security, and safe internet browsing practices.3. Interactive Training Methods: Propose interactive training methods to engage employees and volunteers effectively. Consider the use of workshops, simulations, or online modules to ensure maximum participation and retention of cybersecurity best practices.4. Reporting and Incident Response: Discuss the importance of establishing reporting mechanisms for suspected security incidents. Recommend incident response procedures for handling potential security breaches within the nonprofit organization.Your assignment must follow the provided formatting requirements, be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides. Citations and references must follow APA or school-specific format.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:1. Describe the role of information systems security (ISS) compliance and its relationship toU.S. compliance laws.2. Use technology and information resources to research issues in security strategy and policy formation.3. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.Click4here4to view the grading rubric.Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric