CYSE 425W

Cybersecurity Strategy and Policy

This course focused on developing, implementing, and evaluating cybersecurity strategies and policies across organizational and national levels. I gained experience in strategic planning, risk management, and policy analysis while exploring how cybersecurity policy intersects with business goals, government regulations, national security, and ethical considerations. Emphasis was placed on writing clear, effective policy documents and critically assessing the impact of cybersecurity decisions on various stakeholders.

Skills

  1. Cybersecurity policy development and strategic planning
  2. Risk management in cybersecurity policy frameworks
  3. Assessment and critique of existing policies at the organizational and national levels
  4. Strategic thinking and long-term planning
  5. Policy writing and professional communication
  6. Ethical and political awareness in cybersecurity decision-making

Experience

Skill Highlighted: Assessment and Critique of Existing Policies at the Organizational and National Levels
Also Demonstrates:
Cybersecurity Policy Development and Strategic PlanningEthical and Political Awareness in Cybersecurity Decision-MakingPolicy Writing and Professional Communication

This paper critically analyzes President Biden’s Executive Order 14028 and its ripple effects across proposed legislation, including the Consumer Data Privacy and Security Act, the SAFE DATA Act, the DATA Privacy Act, and the GOOD AI Act. I assessed the political tension between national cybersecurity objectives and consumer privacy rights, evaluating how policymakers respond to evolving cyber threats. This artifact demonstrates my ability to critique federal initiatives, synthesize legislation into clear analysis, and identify long-term implications for digital rights and AI regulation. It reflects my awareness of how ethics, law, and politics intersect in cybersecurity strategy.

annotated-2

Skill Highlighted: Ethical and Political Awareness in Cybersecurity Decision-Making
Also Demonstrates:
Risk Management in Cybersecurity Policy FrameworksCybersecurity Policy Development and Strategic PlanningPolicy Writing and Professional Communication

This artifact presents a deep ethical analysis of Executive Order 14028, focusing on the growing tensions between national cybersecurity mandates and privacy concerns, as well as the burden placed on smaller government contractors. I evaluated ethical issues around user data transparency and private sector compliance with federal policy timelines. By incorporating both government reports and academic literature, I explored political and economic impacts on cybersecurity readiness and equity. This work highlights my ability to assess federal strategy from a critical, ethically grounded perspective while communicating risk and complexity to nontechnical stakeholders.

annotated-3final

Skill Highlighted: Analysis of Privacy, Cyberwarfare, and Responsible Disclosure Issues
Also Demonstrates:
Application of Ethical FrameworksAwareness of Social and Professional Responsibility in Tech ContextsEthical Reasoning and Accountability

This case study explores ethical responses to election interference and disinformation campaigns conducted by state actors such as Russia, China, and Iran. Drawing on the Ethics of Care and scholarship from Valerie Morkevicius and Jarred Prier, I examined how manipulation through social media and search engine optimization constitutes a form of information warfare that disrupts mutual trust and democratic stability. This artifact demonstrates my ability to evaluate complex geopolitical cybersecurity threats through ethical frameworks, assess the role of technology in global conflict, and argue for responsible strategies that preserve interdependence and democratic integrity.

annotated-4.edited