Copywrong: Are You a "Cyber Pirate"?
All Cybersecurity business writing should be written at a professional, academic level. Examples of business writing might include, but not limited to: 1) BIA, 2) RFP 3) Slide deck presentations, 4) Executive Summaries, 5) Project Management Plans, 6) DFIR/IR, 7) Playbooks/Cybersecurity Management Program, 8) Cyber Ethics/Law, 9) Cyber Framework Documentation, 10) RFI/Research Proposals.
A Cybersecurity Professional must present sensitive, important information in accordance with writing style guides, legal considerations, and credible, professional source citation. This Copywrong presentation will focus on the four domains that comprise IP(Intellectual Property): Copyright, Patent, Trademark, Trade Secrets. Copyright will be the focus for this presentation and include a multitude of resources shared and explanation of fair use, copyright permissions, and Creative Commons explained.
The presentation will instruct meaning and use of credible sources, while covering the different style guides inclusive of online resources, citation machines and manual source citation. The use of Grammarly/Turnitin will be reviewed, and online resources presented to create professional bibliographies in proper format. Plagiarism will be defined and audience will receive information on how to avoid being a Cyber Pirate. The closure includes tips for professional writing, contact information, and question/answer.