Case Study 1 After Action Review 7 PAGES – 12 PT – TIMES NEW ROMAN SEE ATTACHED FILES *the essay attached – has to match with this new one

We're the ideal place for homework help. If you are looking for affordable, custom-written, high-quality and non-plagiarized papers, your student life just became easier with us. Click either of the buttons below to place your order.


Order a Similar Paper Order a Different Paper

Case Study 1 After Action Review

7 PAGES – 12 PT – TIMES NEW ROMAN

SEE ATTACHED FILES

*the essay attached – has to match with this new one

Case Study 1 After Action Review 7 PAGES – 12 PT – TIMES NEW ROMAN SEE ATTACHED FILES *the essay attached – has to match with this new one
Case Study Proposal Student’s Name Institutional Affiliation Course Instructor’s Name Due Date Case Study Proposal Scenario I was part of an eight-person virtual team that was charged with the responsibility of implementing changes in cybersecurity systems, products, and policies for the company in which we work. The company had operated the systems in its situation until 2 years after the implementation of the cybersecurity changes when there were imminent threats of hacking and phishing of the sensitive data from the company’s database (Nunamaker et al., 2009). The changes and revisions of the policy and data authorization systems in the company were done through a virtual team that collaborated with different teams of experts in IT, cybersecurity, law, and data and information to make it viable and keep the company from instances of such threats in the future. The team met regularly and divided their roles based on their expertise to ensure the success of the project. Experience Action of the Team The team collaboration began in late April of this year. All eight members of the virtual team were set up with the necessary technology and resources in order to begin the process of implementing changes to the company’s cybersecurity systems, products, and policies. The team worked together to identify areas of improvement and develop a plan of action to address them in a timely manner. They communicated regularly to ensure that all deadlines were met and that the changes were completed properly. By the end of May, the team had successfully implemented the desired changes. The members of the virtual team included a project manager, a technical analyst, a security specialist, a software engineer, an operations specialist, a systems analyst, a business analyst, and a communications specialist. Each member brought unique experience and skills to the table, and they worked together to ensure that the changes were properly implemented. The team was able to draw on the combined knowledge and expertise of each member in order to complete the project in a timely and efficient manner. The purpose of the collaboration was to implement changes in the company’s cybersecurity systems, products, and policies. The team worked together to identify areas of improvement and develop a plan of action to address them. They also sought to ensure that all deadlines were met and that the changes were completed properly (Watkins, 2013). The team worked together to make sure that the company was protected from potential cyber threats and that its data was secure. The collaboration was a success, and the changes were successfully implemented. The virtual team met regularly throughout the period of April to May. In total, they had at least fifteen meetings, where they discussed progress and review changes. The meetings were conducted using online video conferencing tools, which allowed them to communicate effectively despite being in different locations. The team employed various technologies in their collaboration. They relied on online video conferencing tools such as Zoom and Skype to communicate with each other. They also used Google Docs and Slack to share documents and communicate in real time (Nunamaker et al., 2009). The team used project management and collaboration tools such as Trello and Asana to ensure that all deadlines were met and that the changes were properly implemented. The collaboration is chosen because it is diverse and dynamic and it explores very sensitive matters based on the technology of the virtual team. One of the main challenges that the team faced during their collaboration was the lack of face-to-face interaction. Since the team was virtual, members had to rely on online video conferencing tools in order to effectively communicate. Some members had difficulty keeping up with the pace of the project due to time zone differences (Morrison-Smith & Ruiz, 2020). The team had to work together to ensure that everyone was on the same page and that deadlines were met. References Morrison-Smith, S., & Ruiz, J. (2020). Challenges and barriers in virtual teams: A literature review. SN Applied Sciences, 2(6). https://doi.org/10.1007/s42452-020-2801-5 Nunamaker, J. F., Reinig, B. A., & Briggs, R. O. (2009). Principles for effective virtual teamwork. Communications of the ACM, 52(4), 113–117. https://doi.org/10.1145/1498765.1498797 Watkins, M. D. (2021, September 13). Making virtual teams work: Ten basic principles. Harvard Business Review. Retrieved January 17, 2023, from https://hbr.org/2013/06/making-virtual-teams-work-ten

Writerbay.net

Do you need academic writing help? Our quality writers are here 24/7, every day of the year, ready to support you! Instantly chat with a customer support representative in the chat on the bottom right corner, send us a WhatsApp message or click either of the buttons below to submit your paper instructions to the writing team.


Order a Similar Paper Order a Different Paper
Writerbay.net