CONTEMPORARY STRATEGIC INFORMATION SYSTEMS
Considering the case study.
1. Critically assess the information risks and challenges of the existing system to determine the deeper reasons why the information breach occurred.
2. Based on these risks, devise a contemporary information systems/security strategy report to the company, considering the alignment of business and IT strategy
3. Use appropriate risk methodologies to support your analysis, while making appropriate recommendations where necessary