Chat with us, powered by LiveChat Follow theinstruction. Week 10 – Summary Report and Executive Presentation Overview Now that you have put together the pieces of your project, you are being asked by the CEO to pres - Writingforyou

Follow theinstruction. Week 10 – Summary Report and Executive Presentation Overview Now that you have put together the pieces of your project, you are being asked by the CEO to pres

Follow the instruction.

Week 10 – Summary Report and Executive Presentation 

Overview

Now that you have put together the pieces of your project, you are being asked by the CEO to present this information to the board. 

From: PM
To: Project Team
CC: CEO/CIO

The CEO has requested a presentation to the board from your part of the team. You will put together a report summarizing everything you’ve created so far for your part of the project. Outline the material about the company as you understand it, including all about our product and the players on the team. Then include all your plans and the business requirements from your part of the team, which is the most important part of this project. Without you, the board of directors won’t likely approve the budget and this project will fail. (No pressure.)  After you’ve created the report, we’ll need a 10–15 slide PowerPoint presentation. Please use MS PowerPoint as the boss doesn’t have anything else on the machine that has been issued by the company.  Use bulleted lists to boil down the main points on the slides, and use the speaker notes to include all the facts and figures you want to present. You won’t have to present this at the board meeting because the boss wants to present it personally. So make sure it’s a good presentation with a professional layout. We’re all counting on you to make or break the project.

Instructions

This assignment contains two parts: a summary report and a presentation. 

Summary Report

For the summary report, submit a written document to summarize what you have created for your part of the project. This includes the following:

  •  An outline of the company as you understand it, including your product and the players on the team. 
  • Your plans and business requirements for your part of the team.

Keep in mind that this is to be presented to the board in order to gain approval for the project. Your language should be professional in nature and include all helpful information in a condensed, easy-to-understand format.

Presentation

In addition to the report, create a 10–15 slide PowerPoint presentation using MS PowerPoint. You need to use the PPT Template file from your company so that it is consistent with other company visuals.Use bulleted lists to boil down the main points on the slides. Again, this should also be professional in nature and in a condensed and easy-to-understand format. Use a consistent and professional layout, and be sure to check for spelling and grammar errors before submitting.Add speaker notes to each slide to include all the facts and figures you want to present and any other notes regarding what should be emphasized by the speaker.As a reminder, the deliverables for this week are:

  1. Word document: A summary (not a cut and paste) of your previous three deliverables, including the overview of the company, the process flow, and the business requirements including the budgetary requests for the project.
  2. A PowerPoint slide presentation of 10–15 slides with professional slides and speaker notes.

Your Company’s Name Here

The name of your presentation or project here

Your Name

Date

Class Name

Professor Name

University Name

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

1

Table of contents or list of stuff you’re going to cover in your presentation

Project's goals

Objectives

Scope

Control measures.

value of the proposed solution (Compared to competitive advantage)

Project’s cost Estimate

Gantt Chart

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

2

Project's goals

List your goals

And maybe sub goals

If you have more than one sub-goal

Here.

Major goals and sub goals listed

Up here in the slide

And explained in the notes fully below

Up here will jog your memory and below is what you actually say

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

3

Objectives

List of objectives

Main points again from your paper

Sub points tabbed in here

Keep these brief

Maybe add pictures or charts

To keep it fresh

And creative

Co-workers in the Accounting Dept.

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

4

Scope

Talk about your scope

Just use bulleted lists to jog your memory

The detail is below in the notes section

Grab the bar with your pointer if you can’t see the notes

Go on Youtube or LinkedIn Learning if you don’t know Powerpoint.

It’s easy to learn.

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

5

Control measures

Don’t forget charts and drawings

Points from your paper

Main points again from your paper

Sub points tabbed in here

Keep these brief

Maybe add pictures or charts

To keep it fresh

And creative

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

6

Important stuff about your company?

Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5

value of the proposed solution

Talk about the value of your proposed solution (Project) and how it will give your company:

A competitive advantage in the market.

The detail is below in the notes section

But this is the important points up here in the bulleted list.

Go on Youtube or LinkedIn Learning if you don’t know Powerpoint.

It’s easy to learn.

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

7

Project Cost

In the real world:

This is the bottom line

Needs to be thorough and clear

Pictures are great

Be POSITIVE!

Spending money is an investment

Be sure and confident

Money is always a picture or chart showing return on investment (ROI)

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

8

Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5

Project Timing

Great place to put your Gantt Chart with an explanation here of how to read it. The more detail here the better, and maybe talk about scope change within the last week or two?

9

Sources:

;laskdjf;alskdfh;a sjdhf lakjsdfhla ksdfl akjsdhflka shdlkf halsdjkf halsj dfhlas dhflak jshdflka jsdhlfk ashd

A; lkdfj;alsd f;alsd kjf;alks jdf;lakjs df;la ksd;f kjas;dlfk ja;sldk f;askd jf;alsk jdf

A;sldkfj ;alskd jf;alskd jf;laks jdf;lak sjdf;lkaj sd;flk ja;sldk jf;a lskdjf;a ksdjf; alkjsd;flkaj s;dlf kj

As;dlkfj a;sldk fj;alskd jf;lakshd f;aljhsd flkajhsd f;lkas dflkj a;sldfjh a;ldskhf ;alskd jf;alsk hg;lakhg

A;sldfkh a;sldjgh ;alskdf h;alsjdgh ;asljfdh ;lasjhdg;lashd;laksh df;lashd f;lashd

Don’t forget to add speaker notes as mentioned in the instructions down here. This part is very important. You should keep the slides free of clutter and only include the main bullet points from your paper. Then go into more depth down here.

10

image1.jpeg

image6.jpeg

image7.jpeg

image8.png

image2.png

image9.jpg

image10.png

,

EM Cybersecurity Center

LoCKed WITH uS

Memo To: Moja Negash Project Manager

From: Endashaw Melaku

CC: Bemnet Negash

Dear Moja Negash. Thanks for the invitation to this team. Here is the information as I understand it:

CEO: Bita Endash

CIO: Hiwot Sahlu

Cybersecurity Specialist: Alex Nega

Networking Specialist: Babi Mela

IT Project Management Specialist: Bogea Shawle

Data Analytics Specialist: Mihret Negash

Software Development Lead: Meaza Mel

Our organization

Our organization is committed to providing world-class cybersecurity services to businesses, with an

emphasis on cybersecurity forensics. Our team consists of cybersecurity experts with years of

experience in the field. We are committed to ensuring that the data of our clients is protected against all

types of threats.

My Expertise I bring to the team

My role on the team as the Cybersecurity Forensics Specialist will be to manage and support daily

cybersecurity operations. This includes triaging and processing alerts, assisting with proactive threat

hunting, assisting with threat intelligence projects, and coordinating and escalating activities with the

1 N 1st AVE Philadelphia PA 19100 T: 1(855)123-1234 W: emcybersecuritycenter.com

EM Cybersecurity Center

LoCKed WITH uS

cybersecurity team. In addition, I will serve as a Cyber Security Operations Center (SOC) Manager,

assisting organizations in establishing modern Cyber Security Operations Centers with comprehensive

incident response and investigation strategies.

I have acquired extensive knowledge in cybersecurity and forensics, including incident response and

investigations, through my Strayer concentration. I have also obtained several pertinent certifications,

including (CISSP) and (CCSP), which have equipped me with the knowledge and skills necessary to

manage security operations and handle complex security incidents effectively.

In addition, I have experience with cloud security and have worked on multiple cloud security-related

initiatives. I have created data loss prevention policies for a variety of cloud services, including Box,

OneDrive, SharePoint Online, Google Workspace, and Exchange Online, as well as defined cloud security

benchmarks that align with industry standards.

My interaction with the team will contribute to the success of the project by providing expert counsel

on cybersecurity operations, SOC management, and incident response. My experience with cloud

security will also allow me to provide valuable insights and cloud service security strategies. In addition,

my expertise in developing data loss prevention policies and training materials will aid in ensuring the

security of our client's data.

I am confident that my knowledge and experience make me an valuable asset for this project. I am

eager to collaborate with the team and utilize my knowledge and abilities to my full potiential to ensure

the project's success. I appreciate your consideration of my application and look forward to contributing

to the success of the endeavor.

Job Description

Cybersecurity Forensics Specialist

https://www.glassdoor.com/Job/cybersecurity-jobs SRCH_KO0,13.htm?

clickSource=searchBox

2 1 N 1st AVE Philadelphia PA 19100

T: 1(855)123-1234 W: emcybersecuritycenter.com

  • Memo

,

EM Cybersecurity Center

Locked WITH us

Memo To: Moja Negash PM’s

From: Endashaw Melaku

CC: Bemnet Negash

Dear Moja Negash

I have been asked to advise the team on whether they should build their server

infrastructure to run the software or choose a third-party hosting service. I have laid out

the benefits and drawbacks of each alternative and made a recommendation based on

my knowledge and expertise.

Pros and Cons

In-House Solution

Pros

More leeway to alter the look and feel of the program and its capabilities (Alshamrani, 2019).

Reduced risk of a data breach due to independence from third-party service providers (Meyer, 2018).

Long-term savings may be more significant because hosting costs are eliminated (Johansson, 2018).

1 N 1st AVE Philadelphia PA 19100 T: 1(855)123-1234 W: emcybersecuritycenter.com

Cons

costly preliminary investment in computer components (hardware, software, and network) is essential (Johansson, 2018).

In-house IT support is essential for routine upkeep, bug fixes, and other issues (Alshamrani, 2019).

Lack of scalability for expansion, as hardware and software upgrades, will be required as the company grows (Meyer, 2018).

Hosting Solution

Pros

There is zero initial outlay for IT infrastructure, software, or hardware (Kumar, 2017).

Highly adaptable and scalable, as hosting providers can add resources as needed (Johansson, 2018).

Service providers can help with things like upkeep, upgrades, and problems by providing their knowledge and resources (Kumar, 2017).

Cons

Risks associated with relying on third parties for essential services (Meyer, 2018).

Long-term expenditures for web hosting can add up (Alshamrani, 2019).

Lack of ability to alter the appearance and behavior of the software (Johansson, 2018).

2

Recommendation

Given these benefits and drawbacks, I propose we use the hosting solution for our software requirements. The hosting solution provides scalability and flexibility, which are crucial to our firm as we expand, but the in-house solution would allow more control and personalization. Additionally, by having a hosting company handle our software requirements, we can reallocate IT resources elsewhere.

Gantt Chart Subtasks Subtasks:

Find a suitable web host after some investigation (one week).

Schedule the software's installation and setup with the hosting company (two weeks).

Software testing and setup (two weeks)

One week of software training for employees.

Timeline:

Dates for looking into and choosing a hosting company are May 2nd through May 6th, 2023.

Plan the software's installation and configuration with the host: From May 9-20, 2023

Applying software tests and settings: Between May 23 and June 6, 2023

Staff software training: From June 7-14, 2023

Equipment Needs:

No equipment is required for this solution.

3

Timelines:

Date to install and configure software: May 16th, 2023

The date of testing and setup is June 6, 2023.

Sources/References

Sharma, A., Singh, U. K., Upreti, K., Kumar, N., & Singh, S. K. (2021, October). Comparative

analysis of security issues & vulnerabilities of leading Cloud Service Providers and in-

house University Cloud platform for hosting E-Educational applications. In 2021 IEEE

Mysore Sub Section International Conference (MysuruCon) (pp. 552–560). IEEE.

https://ieeexplore.ieee.org/abstract/document/9641545/

Hung, Y. T., Wu, C. F., Liang, T. H., Chou, S. S., Chen, G. L., Wu, P. N., … & Sheu, S. J. (2019). Developing a decision-aid website for breast cancer surgery: an action research approach. Journal of medical Internet research, 21(2), e10404.

https://www.jmir.org/2019/2/e10404/

Mittal, A., Chand, P. K., & Rahul, A. (2021). A framework for selection of global in-house centers outsourcing destinations in India. International Journal of Business and Globalisation, 28(3), 233–261.

https://www.inderscienceonline.com/doi/abs/10.1504/IJBG.2021.115563

4

  • Memo
  • Pros and Cons
    • Pros
    • Cons
    • Pros
    • Cons
  • Recommendation
  • Given these benefits and drawbacks, I propose we use the hosting solution for our software requirements. The hosting solution provides scalability and flexibility, which are crucial to our firm as we expand, but the in-house solution would allow more control and personalization. Additionally, by having a hosting company handle our software requirements, we can reallocate IT resources elsewhere.
  • Gantt Chart Subtasks
    • Subtasks:
    • Timeline:
    • Equipment Needs:
    • Timelines:

,

EM Cybersecurity Center

Locked WITH us

Memo To: Moja Negash Project Manager

From: Endashaw Melaku

CC: Bemnet Negash

Dear Moja Negash

Business Requirements

My team and I have identified the following resource requirements for our project. Firstly, we

must acquire new laptops for our team members and a printer and scanner to handle documentation.

Regarding software, we must have access to the latest versions of Microsoft Office and Adobe Creative

Suite, as these tools are essential for our tasks. We will also require a designated space to meet with

outside contractors, ensuring effective collaboration. Furthermore, to support our project workload, we

will need two additional staff members, which will require a budget of $4,000. Lastly, our existing

personnel must allocate 10 hours per week to work specifically on our project. These resources are

crucial for our team's success and will enable us to deliver high-quality results.

How I created an estimate for each of the resources, have listed in the attached Excel spreadsheet:

1 N 1st AVE Philadelphia PA 19100 T: 1(855)123-1234 W: emcybersecuritycenter.com

Process Used

I followed a systematic approach to derive the cost estimates for the required resources. For

hardware, I based the estimates on the current prices of laptops, printers, and scanners available on the

official Apple website (Apple, 2022). Similarly, the software cost estimates were determined by referring

to the Microsoft Office and Adobe Creative Suite prices listed on the Microsoft website (Microsoft,

2018). To estimate the cost of the outside contractor space cost, I relied on the rental prices of meeting

rooms provided by the Regus website (Regus,2019). The applications cost estimates aligned with the

software estimates, considering the Microsoft Office and Adobe Creative Suite prices from the Microsoft

website. The cost estimate for the additional staff or contractors was derived from the salary

considerations for two additional staff members. Finally, the estimate for the hours needed by existing

personnel to work on the project was based on their respective salaries. This comprehensive

methodology ensured that the cost estimates encompassed all relevant factors.

Source:

Apple. (2022). Apple Store Online. Apple. https://www.apple.com/store

Microsoft. (2018). Microsoft – Official Home Page. Microsoft.com. https://www.microsoft.com/

Regus. (2019) Regus US | Office Space, Meeting Rooms & Virtual Offices. Regus.com.

https://www.regus.com

  • Memo

,

EM Cybersecurity Center

Locked WITH us

Memo To: Moja Negash Project Manager

From: Endashaw Melaku

CC: Bemnet Negash

Dear Moja Negash.

Customers login into the application and place orders. The orders are then stored in the database.

When the customer makes payment for their orders, the order data is sent to a warehouse closest the

customer. When the products ordered are delivered to the customer, a delivery report is sent to the

ordering system and it updates the order status.

STREET ADDRESS, CITY, STATE ZIP CODE T: TELEPHONE W: WEBSITE

Data Analytics 1. Data Storage: The e-commerce application will generate a vast amount of data that needs to be

stored in a reliable and scalable manner. We will use Amazon S3 storage to store transaction

logs, user data, and product data.

2. Data Creation: Data analytics relies on collecting data from various sources, such as user

behavior, sales, and marketing campaigns. The e-commerce application can collect this data

through web analytics tools such as Google Analytics, or by integrating with various APIs and

services such as social media platforms, email marketing tools, and payment gateways.

3. Data Modification: Once the data has been collected, it may need to be modified or enriched to

enable effective analysis. This can include data cleaning, data transformation, and data

enrichment, which will be performed using AWS Glue, which can extract, transform, and load

data from various sources.

4. Data Deletion: The application will generate a significant amount of data, which can quickly

accumulate and take up storage space. To optimize data storage and ensure regulatory

compliance, data will need to be deleted periodically. This will be accomplished using various

data deletion tools provided by AWS, such as Amazon S3 Lifecycle policies, which can delete old

data automatically after a specified period.

Data Management 1. Security and Access Control: The e-commerce application will use AWS Identity and Access

Management (IAM) to control access to resources and enforce policies for data security.

2. Backup and Disaster Recovery Plan: The e-commerce application must have a backup and

disaster recovery plan to ensure that data is protected against unexpected. We will use Amazon

S3 versioning, which can automatically create and retain multiple versions of data, and AWS

Disaster Recovery, which provides replication of data across regions for disaster recovery.

2

Cybersecurity 1. Malware Concerns: We will use security features provided by AWS, such as network firewalls and

antivirus software, to protect against malware attacks.

2. Physical and Logical Access: AWS provides several security measures, such as biometric

authentication and security cameras, to control physical access to data centers. Logical access

can be controlled using IAM roles and policies.

3. Forensic Investigation: In case of security breach we will use AWS CloudTrail and AWS Config to

audit and investigate security-related events.

IT Project Manager 1. Project Control: The IT project manager must ensure that the project is completed on time,

within budget, and meets the project's objectives. This involves monitoring project progress,

identifying and mitigating risks, and managing stakeholder expectations.

2. PM Methodologies: The development of this application will use agile project management

methodology.

3. Scope Control: Scope control is critical for ensuring that the project stays on track and within

budget. The IT project manager must ensure that the project scope is clearly defined and

controlled throughout the project's lifecycle.

4. End-User Input: End-user input is crucial for ensuring that the e-commerce application meets the

end-users' needs. The IT project manager should involve end-users in the project planning and

development process to gather feedback and incorporate it into the project.

5. Training: The IT project manager must ensure that end-users and other stakeholders are

adequately trained on how to use the e-commerce application. This involves developing training

materials, conducting training sessions, and providing ongoing support.

Networking 3

1. Network topology: Token passing topology will be used to logically control access to the

application

2. Network Infrastructure Build-out and Expansion: The IT team must ensure that the network

infrastructure is built out to support the e-commerce application's traffic requirements. As the

application grows, the network infrastructure must be expanded to accommodate additional

traffic and users.

3. Required Equipment and Physical Media Acquisition and Control: The IT team must acquire the

necessary network equipment, such as routers, switches, and firewalls, and physical media, such

as network cables, to support the e-commerce application. They must also ensure that the

equipment and physical media are properly controlled to prevent unauthorized access.

4. Network Security: Network security is critical for protecting the e-commerce application and its

data from cyber threats. The IT team must implement appropriate security measures, such as

firewalls, intrusion detection and prevention systems, and virtual private networks, to secure the

network infrastructure.

Software Developers 1. Applications Needed: The software developers must work with the business stakeholders to

identify the software applications needed for the e-commerce application. This may include

developing custom applications or integrating third-party applications.

2. Input from End-users: End-user input is critical for ensuring that the software applications meet

the end-users' needs. The software developers should involve end-users in the design process to

gather feedback and incorporate it into the application design.

3. Design Process: The software developers must follow a design process that includes

requirements gathering, design, implementation, testing, and deployment. The design process

should be