Discuss how you would develop and implement an information system contingency plan for a large hospital, or a large government agency, or a major manufacturing facility.

Part 1:
According to NIST (2010), standard elements of a Continuity of Operations Plan (COOP) include: Program plans and procedures, Continuity communications, Risk management, Vital records management, Budgeting and acquisition of resources, Human capital, Essential functions, Test, training, and exercise, Order of succession, Delegation of authority, Reconstitution, and Continuity facilities.
Discuss what the most significant challenges are to ensure that all these standard elements are effectively implemented in an organization’s COOP. Who in the organization should be responsible for the effective implementation of a COOP?
Part 2:
According to NIST (2010), the Information System Contingency Planning Process comprises the following seven steps:
Develop the contingency planning policy;
Conduct the business impact analysis (BIA);
Identify preventive controls;
Create contingency strategies;
Develop an information system contingency plan;
Ensure plan testing, training, and exercises; and
Ensure plan maintenance
Discuss how you would develop and implement an Information System Contingency Plan for a large hospital, or a large government agency, or a major manufacturing facility.

Produce a paper to evaluate the role of adopting cloud computing in accelerating startups’ journey to success, showing the positive the positive effects and value gained by adopting cloud computing along with evaluating cloud computing’s role in mitigating operational risk for startups.

Produce a paper to evaluate the role of adopting cloud computing in accelerating startups’ journey to success, showing the positive the positive effects and value gained by adopting cloud computing along with evaluating cloud computing’s role in mitigating operational risk for startups.

Identify all three ehr software options you have selected for consideration, and include the following in your presentation:

The purpose of this assignment is to compare electronic health record (EHR) software based on the needs of a health care organization. Though not all health care facilities are required to use EHRs to maintain and organize patient files, many medical offices and health practices are becoming increasingly digital to keep up with technology and evolving patient/customer needs.
Assume that you are a health care administrator who oversees a small conglomerate of local clinics. After the recent acquisition of a physical therapy clinic, it was brought to the attention of key stakeholders that the clinics were all operating with different electronic health records software, which was affecting interoperability between clinics. In an effort to streamline communication and improve efficiency, the CEO has asked you to look up some options for a new EHR software to implement across all of your health network’s clinics.
Research the different types of electronic health records software on the market and choose the top three that would prove most beneficial to your health network. In a 6-12 slide PowerPoint presentation complete with robust speaker notes, present your findings to the CEO and other key stakeholders.
Identify all three EHR software options you have selected for consideration, and include the following in your presentation:
1. System requirements and compatible interfaces for each
2. The cost of implementation
3. Timeline for integration and user training
4. Privacy and security options, including patient accessibility to records
5. Capabilities of what each software system will enable clinics to do that they were previously unable to accomplish
6. How each system would facilitate efficient communication and increase interoperability between clinics
7. Pros and cons of each software system in relation to the other options you have selected
8. Recommendation for which option you believe the network should adopt and why
Cite all sources used and include them on a reference slide, not included in the slide length requirement.

Research iot threats and identify three (3) iot devices that are vulnerable to attack.

Internet of Things (IOT) can cover a wide range of needs from home surveillance to industrial robots. Research IOT threats and identify three (3) IOT devices that are vulnerable to attack. These IOT devices should be specific products and NOT a type of product! For example, a Hero Pro 5.
Please provide the specification sheets for each of these products. Then provide three solutions that will prevent these devices from being hacked. If these solutions are products, then include specification sheets for these products as well.
Must be minimum of 2,000 words.
Must have specification sheets for each product
Must have 3 sources