Encana Oil and Gas Case Study Discussion

This week, you read an article outlining digital transformation in latecomer industries, using Encana Oil & Gas as a case study. Based on your readings, lectures, and even content learned from other courses in this program, consider the following prompt:
-What were Encana’s challenges in the marketplace? How did the digital infrastructure address these challenges?
-In drawing upon IT Governance, pick at least two of Encana’s 10 guiding principles (Table 1) and show how they influenced its digital infrastructure.
-Critique Encana’s approach to IT outsourcing. What would you do differently to overcome resistance to outsourcing?

Benchmark alternative vehicle Fuel adoption among consumers

Choosing the right electric car is slightly different from buying a conventional gas car or a petrol-electric hybrid car. You need to think about range and charging more than you think of a petrol car and learn the language of electric vehicles. And the way the engine functions. What are the main differences between electric cars and gas cars? A frequently asked question by common car buyers, each option has its advantages and disadvantages, leading us to which technologies you should go for. So what makes each of these electrification technologies different?

Identity and Access Management

NOTE: This paper requires you to listen to podcast. See link below in instructions.
PODCAST: https://risky.biz/soapbox45/
As the infrastructure of organizations migrate outside of the legacy data center and into places like IaaS (i.e. Microsoft Azure, Amazon AWS), SaaS (i.e. ServiceNow, Salesforce) and more, security teams have had to revisit how they approach security. With the internet now acting as the “new network” and organization assets needing to be available on it at all times, it makes sense that Identity and Access Management practices will play a more crucial role. With this in mind, Okta, a technology leader in the IAM space, is paving the way for organizations to be able to establish IAM solutions that work in this new landscape.
Listen to this Risky Business podcast with Sami Laine, Okta’s Director of Technology Strategy, as he discusses how this transition to decentralized infrastructure is driving a fundamental shift in how organizations perform IAM.
PODCAST: https://risky.biz/soapbox45/
Once you’ve completed listening to this podcast, write a two page paper discussing what you learned, and make a case as to whether you believe Sami Laine is correct in his belief that identity is the new perimeter.
To help with some of the alphabet soup put forth in this podcast, here is a key to help you out.
ML – Machine Learning
AI – Artificial Intelligence
UBA – User Behavior Analytics
CI/CD – Continuous Integration / Continuous Development
AD – Active Directory
GPO – Group Policy Objects
MDM – Mobile Device Management
MFA – Multifactor Authentication
IdP – Identity Provider
SP – Service Provider
SUBMISSION DETAILS
Your paper should contain at least two full pages of written content, double spaced, and with standard margins.
Site your sources appropriately, but don’t worry about adhering to any type of specific formatting (i.e. MLA, APA, or the like). NOTE: A page of sources does not count as part of your two pages of written content!
Submit your paper below in one of these three formats; Word, Pages, or PDF.

Military Minded and Cyber Security

Step 1- Review the Title. Come up with a new title (similar to the one in italized and bold)
Step 2 – Review the Data Collection Techniques on page 17-19 Make 2 new entries and proof page 17-19

Cybersecurity Architecture and Engineering

For this task, you will use the attached “Healthy Body Wellness Center Case Study,” “Healthy Body Wellness Center Security Assessment Report,” and the “Business Requirements Document Template” to analyze, assess, and prioritize existing threats to the current architecture and design technical specifications to address identified threats.

Cybersecurity Assessment

You are the Chief Information Security Officer in your organization. Several members of the technology committee of the board of directors were recently informed of the cyberattacks at the University of Calgary (ransomware) and Capital One (breach). Before the next board of directors meeting, they would like a short discussion on lessons from both incidents that can be used to improve the cybersecurity defenses at your chosen organization. Study the information from the sources linked below and others that you may find on both incidents and prepare a concise document answering their questions. Include a perspective on the impact of the incidents on the wider cybersecurity field.
Cohen, Naor, and Catherine Heggerud. “Cyber Attack at the University of Calgary.” Ivey Publishing, 2021.
McLean, Rob. “A Hacker Gained Access to 100 million Capital One Credit Card Applications and Accounts.” CNN Business, July 30, 2019.
– https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html
“Capital One Announces Data Security Incident.” Capital One, July 29, 2019.
– https://www.capitalone.com/about/newsroom/capital-one-announces-data-security-incident/
Submission instructions: Your document should be a minimum of 500 words. Save your document as a Word document or a PDF and share it as an attachment in this discussion forum. Read your peers’ contributions and reply to at least one with thoughtful comments to deepen the discussion.