Presented at
NolaCon 2022,
May 21, 2022, 11 a.m.
(Unknown duration).
<p>All Cybersecurity business writing should be written at a professional, academic level. Examples of business writing might include, but not limited to: 1) BIA, 2) RFP 3) Slide deck presentations, 4) Executive Summaries, 5) Project Management Plans, 6) DFIR/IR, 7) Playbooks/Cybersecurity Management Program, 8) Cyber Ethics/Law, 9) Cyber Framework Documentation, 10) RFI/Research Proposals.<br>A Cybersecurity Professional must present sensitive, important information in accordance with writing style guides, legal considerations, and credible, professional source citation. This Copywrong presentation will focus on the four domains that comprise IP(Intellectual Property): Copyright, Patent, Trademark, Trade Secrets. Copyright will be the focus for this presentation and include a multitude of resources shared and explanation of fair use, copyright permissions, and Creative Commons explained.<br>The presentation will instruct meaning and use of credible sources, while covering the different style guides inclusive of online resources, citation machines and manual source citation. The use of Grammarly/Turnitin will be reviewed, and online resources presented to create professional bibliographies in proper format. Plagiarism will be defined and audience will receive information on how to avoid being a Cyber Pirate. The closure includes tips for professional writing, contact information, and question/answer.</p>
Presenters:
-
Philomena Compton
<p>Philomena has been serving as a Technology Media Specialist/educator for 30 years. Her background includes IT networking/troubleshooting, technology integration/professional development, and teaching. She has been instructing/consulting copyright policy since 1996; and teaching writing/research techniques since 1993.<br>Philomena is a National Board Certified Teacher (NBCT) mentoring other educators in their writing process to obtain NBCT. Her BSED is from Athens State University, MLIS from University of Southern Mississippi, and EdS in Educational Technology from Boise State University. She is completing a master's degree from Murray State University in Cybersecurity Management and doctorate at St. Thomas University. </p>
Links: