Business > CASE STUDY > IT 335 Milestone 3.docx IT 335: Wilburs Widgets Security Policy Gap Analysis Southern (All)
IT 335 Milestone 3.docx IT 335: Wilburs Widgets Security Policy Gap Analysis Southern New Hampshire University Implementation Plan There are numerous ways to implement change in an organization.... The textbook, Security Policies and Implementation Issues, focuses on Kotters Eight-Step Change Model, developed by a Harvard Business School professor in 1995. This will be a good implementation model because it focuses on the need to gain buy-in at the executive level. œProfessor Kotter states that to be successful in implementing change in a company at least 75 percent of management needs to œbuy into it. (Johnson, 2014). This model is also separated informal and formal tasks, with steps 1-3 being informal and steps 4-8 being formal. The eight steps are outlined below: Step 1: Create Urgency It is essential for the information security team to be able to effectively communicate the risk that the policy is i. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [Show More]
Last updated: 2 years ago
Preview 1 out of 4 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jun 15, 2021
Number of pages
4
Written in
This document has been written for:
Uploaded
Jun 15, 2021
Downloads
0
Views
64
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·