|
Task Title |
Task Description |
Skills |
Estimated ManHours |
Skill Points ℠ Focus |
Skill Points ℠ Applied |
Total Views |
||
|---|---|---|---|---|---|---|---|---|
| Pilot New System Release with Monitoring and Metrics | Create an initial sample group to pilot the new system release Closely monitor and measure their usage with feedback loops. Calibarate setting and security protocols in anticipation of larger release. | Internal Communication, Process Modeling, Intuitive Problem Solving, Statistical Analysis, Analytical Thinking... | 10000 | 51683 | 157 | 1180 | Soon Interface to Use Template to Create Task Labels | |
| Apply Cybersecurity Strategy for Systems and Applications | From ranked list of cybersecurity threats and vulnerabilities for corporate systems and applications concerns, internally and externally. Create processes to monitor, log, and suggest modifications. | Cloud Infrastructure, Attention to Detail, System Security, iOS System, Android App Design... | 12000 | 81002 | 98 | 1165 | Soon Interface to Use Template to Create Task Labels | |
| Support System after Initial Release | Setup a support apparatus for a system within an organization. Initially antipate higher incident rates and slower adoption rates. Build metrics for continous improvement and automated support. | Technical Support, Cloud Computing, Collaboration, Troubleshooting, Data Monitoring... | 12500 | 87520 | 140 | 1202 | Soon Interface to Use Template to Create Task Labels | |
| Create Onboarding and Training Materials for System Release | Create documentation, presentation materials and online support for the adoption of a new system. Use themes and content for each type of user and team using the system. | Management of Personnel Resources, Content Management, Articulate Technical Information, Documentation, LMS Administration... | 12500 | 85425 | 123 | 1218 | Soon Interface to Use Template to Create Task Labels | |
| Define Corporate Systems Cybersecurity Protocols and Goals | Clearly define a corporate cybersecurity strategy. Evaluate corporate systems. Prioritize actionable security goals and protocols. | Systems Architecture, Network Infrastructure, Database Security, Internal Communication, Cybersecurity Threat Modeling... | 12500 | 69710 | 74 | 1125 | Soon Interface to Use Template to Create Task Labels | |
| Identify Current and Emerging Corporate Cybersecurity Threats | Investigate threats and vulnerabilities of systems and applications, networks and cloud integrations, and other related processes. Rank the results on their probability and potential impact. | Cybersecurity Threat Modeling, Cloud Computing, Cybersecurity Audit, Intuitive Problem Solving, Network Security Audit... | 12500 | 92270 | 93 | 1219 | Soon Interface to Use Template to Create Task Labels | |
| Apply Cybersecurity Strategy On Network and Cloud Infrastructure | Use prioritized list of cybersecurity threats and vulnerabilities to address concerns on a network and cloud infrastructure. Create ongoing processes and protocols to monitor, log, and suggest future modifications. | Analytical Thinking, Network Infrastructure, Cloud Computing, Digital Compliance, Attention to Detail... | 12600 | 68346 | 71 | 1207 | Soon Interface to Use Template to Create Task Labels | |
| Apply Cybersecurity Strategy for Databases and Data | From ranked list of cybersecurity threats and vulnerabilities for databases and data, internally and externally. Create processes to monitor, log, and suggest modifications. | Attention to Detail, Security Management Strategy, Database Audit, Security Incident Response, Ethical Compliance... | 13500 | 83376 | 102 | 1227 | Soon Interface to Use Template to Create Task Labels |
(Focus and Applied) Skill Points are referenced in thousands. These templates seed companies creating Task Labels for their workflow and as input to Project Labels.
Previous
Page
of 4