Administration Policy Matrix Current Administration Regulation Name and Date Four Key Principles Reference Previous Administration Regulation Name and Date Four Key Principles Reference Relevant State Law or Regulation Name and Date Four Key Principles Reference NIST Template Document Number Document Name Date NIST Guidance Federal Cybersecurity Agency Simtray Report – 1 page Administration Policy Matrix – chart Administration Compare and Contrast Chart – 1 page chart Focus on FISMA Report - 2 page discussion NIST Template – refer to nist template document Final Report on National Cybersecurity Policy – refer to final report document you will analyze the current and previous administration's cybersecurity policies within the context of current cybersecurity concerns. You will identify the issues in the policies about which an organization should be concerned, taking into account the effects of the policy on civil liberties with some focus on FISMA and NIST. You will also evaluate FISMA's ability to both assess compliance and insure accountability. By the end of the course, you will understand the effect that administration cybersecurity policy has on your own organization, public or private sector Scenario As the newly hired cybersecurity policy analyst, you are the most qualified in your company to understand the overall framework of cybersecurity initiatives, which often change and evolve over several presidential administrations. Knowing your background, your boss asks you to prepare a comprehensive overview that compares cyber policy tenets from the prior administration to the current. She will present the report to the board of directors. "It's important for us to take a step back periodically to see where we've been, where we are now, and where we are going," she says. The report can include recommendations for improving the current policies with a look toward maintaining civil liberties. The report, your boss says, also should feature updates and the effects of the Federal Information Security Management Acts (FISMA) of 2002 and 2014, and also should consider the role that the National Institute of Standards and Technology (NIST) assumes in terms of cybersecurity policy. You realize that your report has to be crafted in plain language so that the board members who do not have the technical background in cybersecurity matters will understand. Creating such a broad-based document will require some historical research as well as a look at the current laws. It is due in two weeks, so it's best to get started right away. Federal Cybersecurity Agency Simtray Report In this step, you should continue to explore the scenarios within SIMTRAY, "Federal Cybersecurity Agency: Find Your Way in Three Days." If you have not already, you will most likely encounter the following topics in this exercise: classifying information types, intellectual property issues ( intellectual property - cybersecurity), Cyb ...