Title | Description | Skills | ManHours | Focus | Applied | Views | ||
---|---|---|---|---|---|---|---|---|
Match Selected System to Project Requirements | Begin the process of tuning the selected system to match the project objectives. Initialize the data and security setting. Migrate necessary data. Setup user and team accounts. | System Verification Strategy, System Security, Database Systems Knowledge, Data Interpretation, Internal Communication, Business Operations, Management of Personnel Resources, Information Security Management, Project Management, Intuitive Problem Solving, Quality Control Analysis, Troubleshooting, Systems Development | 7500 | 33085 | 156 | 63 | Soon Interface to Use Template to Create Task Labels | |
Apply Cybersecurity Strategy On Network and Cloud Infrastructure | Use prioritized list of cybersecurity threats and vulnerabilities to address concerns on a network and cloud infrastructure. Create ongoing processes and protocols to monitor, log, and suggest future modifications. | Network Infrastructure, Cloud Infrastructure, Cybersecurity Threat Modeling, Network Routing Protocols, Cloud Computing, Computer Architecture, Unit Testing, Process Modeling, Attention to Detail, Windows OS, Android, iOS System, Digital Compliance, Analytical Thinking, Intuitive Problem Solving | 12600 | 68346 | 71 | 52 | Soon Interface to Use Template to Create Task Labels | |
Identify Current and Emerging Corporate Cybersecurity Threats | Investigate threats and vulnerabilities of systems and applications, networks and cloud integrations, and other related processes. Rank the results on their probability and potential impact. | Technical Risk Assessment, Cybersecurity Threat Modeling, Cybersecurity Audit, Database Audit, Network Security Audit, Management of Personnel Resources, Manage Cyber Security Threats, Quantitative Analysis, Data Analysis, Cloud Computing, Digital Compliance, Analytical Thinking, Computational Thinking, Intuitive Problem Solving | 12500 | 92270 | 93 | 64 | Soon Interface to Use Template to Create Task Labels | |
Define Corporate Systems Cybersecurity Protocols and Goals | Clearly define a corporate cybersecurity strategy. Evaluate corporate systems. Prioritize actionable security goals and protocols. | Security Management Strategy, Cybersecurity Audit, Cybersecurity Threat Modeling, Systems Architecture, Network Infrastructure, Network Routing Protocols, Computer Architecture, Digital Compliance, Technology Leadership, Cloud Computing, Database Security, Articulate Technical Information, Internal Communication, Computational Thinking, Complex Problem Solving, Collaboration | 12500 | 69710 | 74 | 59 | Soon Interface to Use Template to Create Task Labels | |
Conduct Feasibility Study for New App | Determine cost, need, projected value and market competitiveness of a new app. | Feasibility Assessments, Market Research Analysis, Quantitative Analysis, Product Strategy, Managerial Finance, Managerial Accounting, Cost Accounting, Project Coordination, Technical Writing, Research Emerging Trends, New Media Literacy, Internal Communication, Software Development | 3525 | 3290 | 56 | 261 | Soon Interface to Use Template to Create Task Labels | |
Create Cybersecurity Monitoring, Logging, and Incident Reporting for Security Threats | Provide way to monitor identified threats and vulnerabilities. Log factors influencing them. Collect and report incidents. Find opportunities to automate. | Technical Support, Troubleshooting, Security Incident Response, Internal Communication, Cataloging, Attention to Detail, Data Monitoring, Documentation, Metadata Schema, Database Design, Cloud Computing, Machine Learning, Collaboration | 7500 | 32992 | 116 | 57 | Soon Interface to Use Template to Create Task Labels | |
Create Onboarding and Training Materials for System Release | Create documentation, presentation materials and online support for the adoption of a new system. Use themes and content for each type of user and team using the system. | Documentation, Visual Design, Presentations, Management of Personnel Resources, Creative Thinking, Content Creation, Content Management, Training, Intuitive Problem Solving, Learning Techniques, Learning Strategies, Create Lesson Plans, Articulate Technical Information, Project Management, LMS Administration, Human Resource Management, Leadership | 12500 | 85425 | 123 | 55 | Soon Interface to Use Template to Create Task Labels | |
Apply Cybersecurity Strategy for Databases and Data | From ranked list of cybersecurity threats and vulnerabilities for databases and data, internally and externally. Create processes to monitor, log, and suggest modifications. | Database Systems Knowledge, Database Security, Data Monitoring, Database Audit, Security Management Strategy, Security Incident Response, Manage Cyber Security Threats, Cloud Databases, Technology Leadership, Attention to Detail, Analytical Thinking, Digital Compliance, Ethical Compliance, Collaboration | 13500 | 83376 | 102 | 44 | Soon Interface to Use Template to Create Task Labels | |
Pilot New System Release with Monitoring and Metrics | Create an initial sample group to pilot the new system release Closely monitor and measure their usage with feedback loops. Calibarate setting and security protocols in anticipation of larger release. | Project Management, Quality Control Analysis, Quantitative Analysis, Analytical Thinking, Intuitive Problem Solving, Troubleshooting, Management of Personnel Resources, Systems Administration, Internal Communication, Statistical Analysis, Process Modeling, Technical Support, Human Resource Management, Information Security Management | 10000 | 51683 | 157 | 62 | Soon Interface to Use Template to Create Task Labels | |
Apply Cybersecurity Strategy for Systems and Applications | From ranked list of cybersecurity threats and vulnerabilities for corporate systems and applications concerns, internally and externally. Create processes to monitor, log, and suggest modifications. | System Verification Strategy, Systems Architecture, System Security, Software Development, Software Testing, Technology Leadership, Manage Cyber Security Threats, Attention to Detail, Unit Testing, Intuitive Problem Solving, Windows OS, iOS System, IOS Development, Android, Android App Design, Cloud Infrastructure | 12000 | 81002 | 98 | 61 | Soon Interface to Use Template to Create Task Labels |
(Focus and Applied) Skill Points are referenced in thousands. These templates seed companies creating Task Labels for their workflow and as input to Project Labels.
Page 1 of 3 123