Sample Management Paper on Designing a Benchmarking Plan

Designing a Benchmarking Plan

After formulating a CRR plan to reduce security information risk that had widely spread in my community, I had to develop a monitoring plan to ensure that the program was well-formulated, especially ensuring effectiveness. Basak et al., (2016) accentuate that each CRR plan has its particular monitoring procedures. Thus, the CRR officers must establish mitigations and applicable strategies to ensure information security while curbing information risks. In that light, after reviewing the comforts and strategic mechanisms put in place to curb information risk, I saw the essence of a monitoring plan to track the effectiveness of the tools set in place.

This risk management benchmark provides more than just generic information about the current information security level. Still, it also differentiates four characteristics of the participating enterprises, allowing the research to be more focused on insights. Carter & Rausch (2006) elaborate that benchmarking does not simply give broad information about the most current condition but compares it with the standard requirements. Thus, benchmarking provide a critical base on which researchers can support their data and CRR plan implementation mechanisms to ensure success.

On benchmarking in residents, about 6 of every 10 interviewed participants suffered from information security risk. Such cases statics raises concerns as Baka et al., (2016) note that at least one individual out of ten should account for the cyberbullying victims. Thus, the agency should make efforts to address these statics by benchmarking private or government organizations that exhibit highly effective information security approaches. As I mentioned in Unit I proposal, about 65% of private institutions, education institutions, and business enterprises suffer from information security risks. Further studies cite that the standard information security risk should only account for 7% of all the risks affecting institutions and organizations globally, despite the rapidly growing technology (Basak et al., 2016). However, noted that government entities were the only institutions less affected by such risk during their study (figure 1), signifying the extent to which other organizations generally neglect community information security.

I have realized that benchmarking is an integral component in monitoring a Community Risk Reduction Plan. Beside the primary risk mitigating measures, the CRR plan should establish secondary measures to mitigate unforeseen risks, especially at the end of the plan (Carter & Rausch, 2006). The inclusion of these measures will also in tracking pre and post-mitigation procedures that will minimize the other unforeseen risks. Notably, to ensure an effective approach to risk management benchmarking, the following reviews should be considered;

The most important thing is to focus internally on improving the risk management practices and the effects of risk management organizational operations. Measures that were put into place to curb information security risk included data encryption, frequent updates of the system, and disposal of outdated hard drives. The performance goals of the CRR plan are aimed at curbing the rampant information security risk. So far, the campaign of sensitizing companies and organizations to update their systems frequently has been effective.

 

Figure 1: Information security identification metrics (Basak et al., (2016)

Relevant metrics about information security risks should be identified and discussed with the department’s relevant stakeholders. An agreement should be found. Then data should be collected to determine the performance skills of the CRR plan and internal benchmarks. The data used to measure the model’s achievement will be collected from the risk management department and analyzed by the task force members. Fire and risk management officers will be responsible for collecting and analyzing the data obtained from the risk management department. The agency chairman will then review the data to ascertain accuracy. It allows you to detect historical trends in your business, assess development, and measure success. Furthermore, this enables you to discover practical individual functions and distribute them as best practices throughout the agency.

I need to look for known information security risks for the internal benchmarking process. For example, My Risk Management Plan will help me and the other stakeholders in the agency create a comprehensive risk management plan. The resources will help identify the risk management efforts and some improvements in risk management policy. The analyzed data obtained from the risk management department will inform the internal focus.

If the benchmarks are not met, other contingency plans that should be implemented include attending risk summits and network with other risk management agencies. Through the seminars, we will meet with other risk management champions and share ideas on further mitigations and strategies that can be put in place to make the agency effective.

The stakeholders in the agency should meet monthly to analyze the data collected from the department and identify areas where modifications are required to ensure that the mitigations and strategies are effective. Amendments agreed by the stakeholders will be communicated to the other staff member through a memorandum, and additional training will be offered when new mitigation and strategic approaches are identified. The duration of the training will depend on the complexity of the new system identified. The modifications will be evaluated by comparing data collected before the amendments are implemented and after they are implemented to see if there are achievements after their implementations. If there are no new achievements, the stakeholders will be met and revised.

 

 

References

Carter, H. R., & Rausch, E. (2006). Management in the fire service. Jones & Bartlett Learning.

Basak, S., Shapiro, A., & Teplá, L. (2016).  Information security risk timeline – Bing images