Title | Description | Skills | ManHours | Focus | Applied | Views | ||
---|---|---|---|---|---|---|---|---|
Train Employees on Corporate Cybersecurity Strategy | Create a training program to teach security protocols relevant to the corporate cybersecurity strategy. Use documents and other media for reference and contracts to establish norms and protocols. | Training, Management of Personnel Resources, Attention to Detail, Organizational Development, Technology Leadership, Manage Cyber Security Threats, Articulate Technical Information, Content Management, Content Creation, Social Perceptiveness, Ethical Compliance, Digital Compliance | 7500 | 37003 | 105 | 236 | Soon Interface to Use Template to Create Task Labels | |
Identify Project Requirements and Stakeholder Expectations | Descibe the objective and scope and stakeholders' expectations. Identify department and teams enacting the project. Determine budget and expenses. Forecast dates, hours, and priorities. | Project Coordination, Strategic Planning, Business Operations, Technical Risk Assessment, Forecasting, Research Emerging Trends, Managerial Accounting, Managerial Finance, Articulate Technical Information, Intuitive Problem Solving, Critical Thinking, Internal Communication, Team Building, Scheduling, Technical Writing, Conduct Focus Groups | 4750 | 11315 | 50 | 269 | Soon Interface to Use Template to Create Task Labels | |
Create Cybersecurity Monitoring, Logging, and Incident Reporting for Security Threats | Provide way to monitor identified threats and vulnerabilities. Log factors influencing them. Collect and report incidents. Find opportunities to automate. | Technical Support, Troubleshooting, Security Incident Response, Internal Communication, Cataloging, Attention to Detail, Data Monitoring, Documentation, Metadata Schema, Database Design, Cloud Computing, Machine Learning, Collaboration | 7500 | 32992 | 116 | 240 | Soon Interface to Use Template to Create Task Labels | |
Define Corporate Systems Cybersecurity Protocols and Goals | Clearly define a corporate cybersecurity strategy. Evaluate corporate systems. Prioritize actionable security goals and protocols. | Security Management Strategy, Cybersecurity Audit, Cybersecurity Threat Modeling, Systems Architecture, Network Infrastructure, Network Routing Protocols, Computer Architecture, Digital Compliance, Technology Leadership, Cloud Computing, Database Security, Articulate Technical Information, Internal Communication, Computational Thinking, Complex Problem Solving, Collaboration | 12500 | 69710 | 74 | 218 | Soon Interface to Use Template to Create Task Labels | |
Conduct Feasibility Study for New App | Determine cost, need, projected value and market competitiveness of a new app. | Feasibility Assessments, Market Research Analysis, Quantitative Analysis, Product Strategy, Managerial Finance, Managerial Accounting, Cost Accounting, Project Coordination, Technical Writing, Research Emerging Trends, New Media Literacy, Internal Communication, Software Development | 3525 | 3290 | 56 | 458 | Soon Interface to Use Template to Create Task Labels | |
Optimize System Effectiveness and Verify Security Protocols | Process of evaluating and improving a system after release. Determin key metrics. Find ways to opimize and automate aspects of the system, | Systems Evaluation, System Design Strategy, Human Resource Management, Quantitative Analysis, Statistical Analysis, Data Analysis, Data Interpretation, Data Monitoring, Analytical Thinking, Security Management Strategy, Business Operations, Business Analysis, Articulate Technical Information, Continuous Improvement | 10000 | 79503 | 124 | 212 | Soon Interface to Use Template to Create Task Labels | |
Identify Current and Emerging Corporate Cybersecurity Threats | Investigate threats and vulnerabilities of systems and applications, networks and cloud integrations, and other related processes. Rank the results on their probability and potential impact. | Technical Risk Assessment, Cybersecurity Threat Modeling, Cybersecurity Audit, Database Audit, Network Security Audit, Management of Personnel Resources, Manage Cyber Security Threats, Quantitative Analysis, Data Analysis, Cloud Computing, Digital Compliance, Analytical Thinking, Computational Thinking, Intuitive Problem Solving | 12500 | 92270 | 93 | 243 | Soon Interface to Use Template to Create Task Labels | |
Apply Cybersecurity Strategy for Systems and Applications | From ranked list of cybersecurity threats and vulnerabilities for corporate systems and applications concerns, internally and externally. Create processes to monitor, log, and suggest modifications. | System Verification Strategy, Systems Architecture, System Security, Software Development, Software Testing, Technology Leadership, Manage Cyber Security Threats, Attention to Detail, Unit Testing, Intuitive Problem Solving, Windows OS, iOS System, IOS Development, Android, Android App Design, Cloud Infrastructure | 12000 | 81002 | 98 | 224 | Soon Interface to Use Template to Create Task Labels | |
Prototype App Screens and Interface | Create both physical and digital replicas of an app interface. Use focus groups to determine app appeal and measure user behaviors. | Prototyping, Product Design, Visual Design, Drawing, UI Design, UI Testing, Human Computer Interaction, Intuitive Problem Solving, Conduct Focus Groups, Novel Thinking, Attention to Detail, Collaboration | 2250 | 1658 | 60 | 456 | Soon Interface to Use Template to Create Task Labels | |
Build First Version of an iOS App | Use prototype and database schema to build an initial version of an app to be used in TestFlight and released to an internal team for testing. | Swift, IOS Development, Computational Thinking, Intuitive Problem Solving, Collaboration, App Deployment | 1750 | 1642 | 289 | 449 | Soon Interface to Use Template to Create Task Labels |
(Focus and Applied) Skill Points are referenced in thousands. These templates seed companies creating Task Labels for their workflow and as input to Project Labels.
Page 1 of 3 123