18 Jun Follow theinstruction. Week 10 – Summary Report and Executive Presentation Overview Now that you have put together the pieces of your project, you are being asked by the CEO to pres
Follow the instruction.
Week 10 – Summary Report and Executive Presentation
Overview
Now that you have put together the pieces of your project, you are being asked by the CEO to present this information to the board.
From: PM
To: Project Team
CC: CEO/CIO
The CEO has requested a presentation to the board from your part of the team. You will put together a report summarizing everything you’ve created so far for your part of the project. Outline the material about the company as you understand it, including all about our product and the players on the team. Then include all your plans and the business requirements from your part of the team, which is the most important part of this project. Without you, the board of directors won’t likely approve the budget and this project will fail. (No pressure.) After you’ve created the report, we’ll need a 10–15 slide PowerPoint presentation. Please use MS PowerPoint as the boss doesn’t have anything else on the machine that has been issued by the company. Use bulleted lists to boil down the main points on the slides, and use the speaker notes to include all the facts and figures you want to present. You won’t have to present this at the board meeting because the boss wants to present it personally. So make sure it’s a good presentation with a professional layout. We’re all counting on you to make or break the project.
Instructions
This assignment contains two parts: a summary report and a presentation.
Summary Report
For the summary report, submit a written document to summarize what you have created for your part of the project. This includes the following:
- An outline of the company as you understand it, including your product and the players on the team.
- Your plans and business requirements for your part of the team.
Keep in mind that this is to be presented to the board in order to gain approval for the project. Your language should be professional in nature and include all helpful information in a condensed, easy-to-understand format.
Presentation
In addition to the report, create a 10–15 slide PowerPoint presentation using MS PowerPoint. You need to use the PPT Template file from your company so that it is consistent with other company visuals.Use bulleted lists to boil down the main points on the slides. Again, this should also be professional in nature and in a condensed and easy-to-understand format. Use a consistent and professional layout, and be sure to check for spelling and grammar errors before submitting.Add speaker notes to each slide to include all the facts and figures you want to present and any other notes regarding what should be emphasized by the speaker.As a reminder, the deliverables for this week are:
- Word document: A summary (not a cut and paste) of your previous three deliverables, including the overview of the company, the process flow, and the business requirements including the budgetary requests for the project.
- A PowerPoint slide presentation of 10–15 slides with professional slides and speaker notes.
Your Company’s Name Here
The name of your presentation or project here
Your Name
Date
Class Name
Professor Name
University Name
Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.
1
Table of contents or list of stuff you’re going to cover in your presentation
Project's goals
Objectives
Scope
Control measures.
value of the proposed solution (Compared to competitive advantage)
Project’s cost Estimate
Gantt Chart
Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.
2
Project's goals
List your goals
And maybe sub goals
If you have more than one sub-goal
Here.
Major goals and sub goals listed
Up here in the slide
And explained in the notes fully below
Up here will jog your memory and below is what you actually say
Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.
3
Objectives
List of objectives
Main points again from your paper
Sub points tabbed in here
Keep these brief
Maybe add pictures or charts
To keep it fresh
And creative
Co-workers in the Accounting Dept.
Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.
4
Scope
Talk about your scope
Just use bulleted lists to jog your memory
The detail is below in the notes section
Grab the bar with your pointer if you can’t see the notes
Go on Youtube or LinkedIn Learning if you don’t know Powerpoint.
It’s easy to learn.
Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.
5
Control measures
Don’t forget charts and drawings
Points from your paper
Main points again from your paper
Sub points tabbed in here
Keep these brief
Maybe add pictures or charts
To keep it fresh
And creative
Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.
6
Important stuff about your company?
Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5
value of the proposed solution
Talk about the value of your proposed solution (Project) and how it will give your company:
A competitive advantage in the market.
The detail is below in the notes section
But this is the important points up here in the bulleted list.
Go on Youtube or LinkedIn Learning if you don’t know Powerpoint.
It’s easy to learn.
Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.
7
Project Cost
In the real world:
This is the bottom line
Needs to be thorough and clear
Pictures are great
Be POSITIVE!
Spending money is an investment
Be sure and confident
Money is always a picture or chart showing return on investment (ROI)
Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.
8
Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5
Project Timing
Great place to put your Gantt Chart with an explanation here of how to read it. The more detail here the better, and maybe talk about scope change within the last week or two?
9
Sources:
;laskdjf;alskdfh;a sjdhf lakjsdfhla ksdfl akjsdhflka shdlkf halsdjkf halsj dfhlas dhflak jshdflka jsdhlfk ashd
A; lkdfj;alsd f;alsd kjf;alks jdf;lakjs df;la ksd;f kjas;dlfk ja;sldk f;askd jf;alsk jdf
A;sldkfj ;alskd jf;alskd jf;laks jdf;lak sjdf;lkaj sd;flk ja;sldk jf;a lskdjf;a ksdjf; alkjsd;flkaj s;dlf kj
As;dlkfj a;sldk fj;alskd jf;lakshd f;aljhsd flkajhsd f;lkas dflkj a;sldfjh a;ldskhf ;alskd jf;alsk hg;lakhg
A;sldfkh a;sldjgh ;alskdf h;alsjdgh ;asljfdh ;lasjhdg;lashd;laksh df;lashd f;lashd
Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.
10
image1.jpeg
image6.jpeg
image7.jpeg
image8.png
image2.png
image9.jpg
image10.png
,
EM Cybersecurity Center
LoCKed WITH uS
Memo To: Moja Negash Project Manager
From: Endashaw Melaku
CC: Bemnet Negash
Dear Moja Negash. Thanks for the invitation to this team. Here is the information as I understand it:
CEO: Bita Endash
CIO: Hiwot Sahlu
Cybersecurity Specialist: Alex Nega
Networking Specialist: Babi Mela
IT Project Management Specialist: Bogea Shawle
Data Analytics Specialist: Mihret Negash
Software Development Lead: Meaza Mel
Our organization
Our organization is committed to providing world-class cybersecurity services to businesses, with an
emphasis on cybersecurity forensics. Our team consists of cybersecurity experts with years of
experience in the field. We are committed to ensuring that the data of our clients is protected against all
types of threats.
My Expertise I bring to the team
My role on the team as the Cybersecurity Forensics Specialist will be to manage and support daily
cybersecurity operations. This includes triaging and processing alerts, assisting with proactive threat
hunting, assisting with threat intelligence projects, and coordinating and escalating activities with the
1 N 1st AVE Philadelphia PA 19100 T: 1(855)123-1234 W: emcybersecuritycenter.com
EM Cybersecurity Center
LoCKed WITH uS
cybersecurity team. In addition, I will serve as a Cyber Security Operations Center (SOC) Manager,
assisting organizations in establishing modern Cyber Security Operations Centers with comprehensive
incident response and investigation strategies.
I have acquired extensive knowledge in cybersecurity and forensics, including incident response and
investigations, through my Strayer concentration. I have also obtained several pertinent certifications,
including (CISSP) and (CCSP), which have equipped me with the knowledge and skills necessary to
manage security operations and handle complex security incidents effectively.
In addition, I have experience with cloud security and have worked on multiple cloud security-related
initiatives. I have created data loss prevention policies for a variety of cloud services, including Box,
OneDrive, SharePoint Online, Google Workspace, and Exchange Online, as well as defined cloud security
benchmarks that align with industry standards.
My interaction with the team will contribute to the success of the project by providing expert counsel
on cybersecurity operations, SOC management, and incident response. My experience with cloud
security will also allow me to provide valuable insights and cloud service security strategies. In addition,
my expertise in developing data loss prevention policies and training materials will aid in ensuring the
security of our client's data.
I am confident that my knowledge and experience make me an valuable asset for this project. I am
eager to collaborate with the team and utilize my knowledge and abilities to my full potiential to ensure
the project's success. I appreciate your consideration of my application and look forward to contributing
to the success of the endeavor.
Job Description
Cybersecurity Forensics Specialist
https://www.glassdoor.com/Job/cybersecurity-jobs SRCH_KO0,13.htm?
clickSource=searchBox
2 1 N 1st AVE Philadelphia PA 19100
T: 1(855)123-1234 W: emcybersecuritycenter.com
- Memo
,
EM Cybersecurity Center
Locked WITH us
Memo To: Moja Negash PM’s
From: Endashaw Melaku
CC: Bemnet Negash
Dear Moja Negash
I have been asked to advise the team on whether they should build their server
infrastructure to run the software or choose a third-party hosting service. I have laid out
the benefits and drawbacks of each alternative and made a recommendation based on
my knowledge and expertise.
Pros and Cons
In-House Solution
Pros
More leeway to alter the look and feel of the program and its capabilities (Alshamrani, 2019).
Reduced risk of a data breach due to independence from third-party service providers (Meyer, 2018).
Long-term savings may be more significant because hosting costs are eliminated (Johansson, 2018).
1 N 1st AVE Philadelphia PA 19100 T: 1(855)123-1234 W: emcybersecuritycenter.com
Cons
costly preliminary investment in computer components (hardware, software, and network) is essential (Johansson, 2018).
In-house IT support is essential for routine upkeep, bug fixes, and other issues (Alshamrani, 2019).
Lack of scalability for expansion, as hardware and software upgrades, will be required as the company grows (Meyer, 2018).
Hosting Solution
Pros
There is zero initial outlay for IT infrastructure, software, or hardware (Kumar, 2017).
Highly adaptable and scalable, as hosting providers can add resources as needed (Johansson, 2018).
Service providers can help with things like upkeep, upgrades, and problems by providing their knowledge and resources (Kumar, 2017).
Cons
Risks associated with relying on third parties for essential services (Meyer, 2018).
Long-term expenditures for web hosting can add up (Alshamrani, 2019).
Lack of ability to alter the appearance and behavior of the software (Johansson, 2018).
2
Recommendation
Given these benefits and drawbacks, I propose we use the hosting solution for our software requirements. The hosting solution provides scalability and flexibility, which are crucial to our firm as we expand, but the in-house solution would allow more control and personalization. Additionally, by having a hosting company handle our software requirements, we can reallocate IT resources elsewhere.
Gantt Chart Subtasks Subtasks:
Find a suitable web host after some investigation (one week).
Schedule the software's installation and setup with the hosting company (two weeks).
Software testing and setup (two weeks)
One week of software training for employees.
Timeline:
Dates for looking into and choosing a hosting company are May 2nd through May 6th, 2023.
Plan the software's installation and configuration with the host: From May 9-20, 2023
Applying software tests and settings: Between May 23 and June 6, 2023
Staff software training: From June 7-14, 2023
Equipment Needs:
No equipment is required for this solution.
3
Timelines:
Date to install and configure software: May 16th, 2023
The date of testing and setup is June 6, 2023.
Sources/References
Sharma, A., Singh, U. K., Upreti, K., Kumar, N., & Singh, S. K. (2021, October). Comparative
analysis of security issues & vulnerabilities of leading Cloud Service Providers and in-
house University Cloud platform for hosting E-Educational applications. In 2021 IEEE
Mysore Sub Section International Conference (MysuruCon) (pp. 552–560). IEEE.
https://ieeexplore.ieee.org/abstract/document/9641545/
Hung, Y. T., Wu, C. F., Liang, T. H., Chou, S. S., Chen, G. L., Wu, P. N., … & Sheu, S. J. (2019). Developing a decision-aid website for breast cancer surgery: an action research approach. Journal of medical Internet research, 21(2), e10404.
https://www.jmir.org/2019/2/e10404/
Mittal, A., Chand, P. K., & Rahul, A. (2021). A framework for selection of global in-house centers outsourcing destinations in India. International Journal of Business and Globalisation, 28(3), 233–261.
https://www.inderscienceonline.com/doi/abs/10.1504/IJBG.2021.115563
4
- Memo
- Pros and Cons
- Pros
- Cons
- Pros
- Cons
- Recommendation
- Given these benefits and drawbacks, I propose we use the hosting solution for our software requirements. The hosting solution provides scalability and flexibility, which are crucial to our firm as we expand, but the in-house solution would allow more control and personalization. Additionally, by having a hosting company handle our software requirements, we can reallocate IT resources elsewhere.
- Gantt Chart Subtasks
- Subtasks:
- Timeline:
- Equipment Needs:
- Timelines:
,
EM Cybersecurity Center
Locked WITH us
Memo To: Moja Negash Project Manager
From: Endashaw Melaku
CC: Bemnet Negash
Dear Moja Negash
Business Requirements
My team and I have identified the following resource requirements for our project. Firstly, we
must acquire new laptops for our team members and a printer and scanner to handle documentation.
Regarding software, we must have access to the latest versions of Microsoft Office and Adobe Creative
Suite, as these tools are essential for our tasks. We will also require a designated space to meet with
outside contractors, ensuring effective collaboration. Furthermore, to support our project workload, we
will need two additional staff members, which will require a budget of $4,000. Lastly, our existing
personnel must allocate 10 hours per week to work specifically on our project. These resources are
crucial for our team's success and will enable us to deliver high-quality results.
How I created an estimate for each of the resources, have listed in the attached Excel spreadsheet:
1 N 1st AVE Philadelphia PA 19100 T: 1(855)123-1234 W: emcybersecuritycenter.com
Process Used
I followed a systematic approach to derive the cost estimates for the required resources. For
hardware, I based the estimates on the current prices of laptops, printers, and scanners available on the
official Apple website (Apple, 2022). Similarly, the software cost estimates were determined by referring
to the Microsoft Office and Adobe Creative Suite prices listed on the Microsoft website (Microsoft,
2018). To estimate the cost of the outside contractor space cost, I relied on the rental prices of meeting
rooms provided by the Regus website (Regus,2019). The applications cost estimates aligned with the
software estimates, considering the Microsoft Office and Adobe Creative Suite prices from the Microsoft
website. The cost estimate for the additional staff or contractors was derived from the salary
considerations for two additional staff members. Finally, the estimate for the hours needed by existing
personnel to work on the project was based on their respective salaries. This comprehensive
methodology ensured that the cost estimates encompassed all relevant factors.
Source:
Apple. (2022). Apple Store Online. Apple. https://www.apple.com/store
Microsoft. (2018). Microsoft – Official Home Page. Microsoft.com. https://www.microsoft.com/
Regus. (2019) Regus US | Office Space, Meeting Rooms & Virtual Offices. Regus.com.
https://www.regus.com
- Memo
,
EM Cybersecurity Center
Locked WITH us
Memo To: Moja Negash Project Manager
From: Endashaw Melaku
CC: Bemnet Negash
Dear Moja Negash.
Customers login into the application and place orders. The orders are then stored in the database.
When the customer makes payment for their orders, the order data is sent to a warehouse closest the
customer. When the products ordered are delivered to the customer, a delivery report is sent to the
ordering system and it updates the order status.
STREET ADDRESS, CITY, STATE ZIP CODE T: TELEPHONE W: WEBSITE
Data Analytics 1. Data Storage: The e-commerce application will generate a vast amount of data that needs to be
stored in a reliable and scalable manner. We will use Amazon S3 storage to store transaction
logs, user data, and product data.
2. Data Creation: Data analytics relies on collecting data from various sources, such as user
behavior, sales, and marketing campaigns. The e-commerce application can collect this data
through web analytics tools such as Google Analytics, or by integrating with various APIs and
services such as social media platforms, email marketing tools, and payment gateways.
3. Data Modification: Once the data has been collected, it may need to be modified or enriched to
enable effective analysis. This can include data cleaning, data transformation, and data
enrichment, which will be performed using AWS Glue, which can extract, transform, and load
data from various sources.
4. Data Deletion: The application will generate a significant amount of data, which can quickly
accumulate and take up storage space. To optimize data storage and ensure regulatory
compliance, data will need to be deleted periodically. This will be accomplished using various
data deletion tools provided by AWS, such as Amazon S3 Lifecycle policies, which can delete old
data automatically after a specified period.
Data Management 1. Security and Access Control: The e-commerce application will use AWS Identity and Access
Management (IAM) to control access to resources and enforce policies for data security.
2. Backup and Disaster Recovery Plan: The e-commerce application must have a backup and
disaster recovery plan to ensure that data is protected against unexpected. We will use Amazon
S3 versioning, which can automatically create and retain multiple versions of data, and AWS
Disaster Recovery, which provides replication of data across regions for disaster recovery.
2
Cybersecurity 1. Malware Concerns: We will use security features provided by AWS, such as network firewalls and
antivirus software, to protect against malware attacks.
2. Physical and Logical Access: AWS provides several security measures, such as biometric
authentication and security cameras, to control physical access to data centers. Logical access
can be controlled using IAM roles and policies.
3. Forensic Investigation: In case of security breach we will use AWS CloudTrail and AWS Config to
audit and investigate security-related events.
IT Project Manager 1. Project Control: The IT project manager must ensure that the project is completed on time,
within budget, and meets the project's objectives. This involves monitoring project progress,
identifying and mitigating risks, and managing stakeholder expectations.
2. PM Methodologies: The development of this application will use agile project management
methodology.
3. Scope Control: Scope control is critical for ensuring that the project stays on track and within
budget. The IT project manager must ensure that the project scope is clearly defined and
controlled throughout the project's lifecycle.
4. End-User Input: End-user input is crucial for ensuring that the e-commerce application meets the
end-users' needs. The IT project manager should involve end-users in the project planning and
development process to gather feedback and incorporate it into the project.
5. Training: The IT project manager must ensure that end-users and other stakeholders are
adequately trained on how to use the e-commerce application. This involves developing training
materials, conducting training sessions, and providing ongoing support.
Networking 3
1. Network topology: Token passing topology will be used to logically control access to the
application
2. Network Infrastructure Build-out and Expansion: The IT team must ensure that the network
infrastructure is built out to support the e-commerce application's traffic requirements. As the
application grows, the network infrastructure must be expanded to accommodate additional
traffic and users.
3. Required Equipment and Physical Media Acquisition and Control: The IT team must acquire the
necessary network equipment, such as routers, switches, and firewalls, and physical media, such
as network cables, to support the e-commerce application. They must also ensure that the
equipment and physical media are properly controlled to prevent unauthorized access.
4. Network Security: Network security is critical for protecting the e-commerce application and its
data from cyber threats. The IT team must implement appropriate security measures, such as
firewalls, intrusion detection and prevention systems, and virtual private networks, to secure the
network infrastructure.
Software Developers 1. Applications Needed: The software developers must work with the business stakeholders to
identify the software applications needed for the e-commerce application. This may include
developing custom applications or integrating third-party applications.
2. Input from End-users: End-user input is critical for ensuring that the software applications meet
the end-users' needs. The software developers should involve end-users in the design process to
gather feedback and incorporate it into the application design.
3. Design Process: The software developers must follow a design process that includes
requirements gathering, design, implementation, testing, and deployment. The design process
should be
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.