1
.
Reflect on the ethical implications of the distinction between information security and information privacy. How do these two concepts impact personal freedom and responsibilities in a digital age?
2
.
Consider a scenario where ethical considerations might conflict with legal requirements in the context of securing information and networks. How would you navigate such a situation?
3
.
Watch this video on developing an ISRM strategy from ISACA Live. Search for an ISRM case study and look for some of the elements discussed. What elements discussed in the video are missing from the ISRM case study you found?
4
.
Should managers depend solely on IT people to solve all security challenges? (Hint: Consider the types of decisions made by general managers versus IT managers.)
5
.
Consider the sectors that are currently most at risk for cyberattacks. How do you think the demand for information security roles within these sectors will evolve in the next five years?
6
.
How would you describe the job of a cybersecurity engineer/manager to someone who does not work in the tech field?