Order Number |
636738393092 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
Elevator Speech for Pitching Assignment
Elevator, Speech, Pitching, Assignment
An elevator speech is an excellent way to convey your skills while networking and seeking employment. Typically, an elevator speech is a one-minute summary of who you are, why you are qualified, and what you have to offer the organization or industry. A brief sales pitch will ensure that you are prepared to discuss your career goals whenever the opportunity presents itself. Review the following two Forbes’ articles:
After you have read the articles, develop your elevator speech. The elevator speech should focus on how you practice leadership. Record your speech using one of the following options:
Once you have completed your recording, share your elevator speech with the class by copying and pasting the link of your recording into the body of your initial post. If you are having trouble recording your elevator speech, please contact your instructor.
Listen/view two of your peers’ elevator speeches and comment on how well they presented the following information: who they are, why they are qualified, and what they have to offer the organization or industry.
Example Elevator Speech
Hi, my name is John and I am a student at Ashford University completing my Bachelor of Arts in Organizational Management. For the past five years, I have worked in a leadership role in the food service industry, where I was able to reduce costs and increase revenues. I am seeking to increase my management responsibilities and move into a district manager role where I can help improve company productivity and increase profitability.
This is my week 1 intro to help you in completing this assignment.
My name is Mike. I was born and raised in New Jersey and now live in North Carolina. I am married with 3 children and 1 grandchild. I currently work for Novant Health as an Or Coordinator for the past 11 years. I also own a janitorial and concession business.
I have an Associate’s degree with Ashford and now going for my Bachelor’s to achieve a promotion at work. I have only One class remaining for my Bachelor’s. My hobbies are spending time with my grandchild and coaching basketball. I am working on my bachelors in hope of getting a supply chain manager position.
Provided an excellent overview of the cybersecurity industry as a whole. Answered the questions: (a) Why does this industry exist? and (b) How does this industry benefit society? Addressed sources of demand for cybersecurity products and services. Appropriately used information from 3 or more authoritative sources. (Reuse of narrative from Case Study #3 is permitted). | Provided an outstanding overview of the cybersecurity industry as a whole. Answered the questions: (a) Why does this industry exist? and (b) How does this industry benefit society? Addressed sources of demand for cybersecurity products and services. Appropriately used information from 2 or more authoritative sources. (Reuse of narrative from Case Study #3 is permitted). | Provided an brief introduction to the cybersecurity industry. Addressed why the industry exists and how the industry benefits society. Addressed sources of demand for cybersecurity products and services. Appropriately used information from authoritative sources. (Reuse of narrative from Case Study #3 is permitted). | Provided an introduction to the industry but the section lacked some required details. Information from authoritative sources was cited and used in the overview. | Attempted to provide an introduction to the industry but this section lacked detail and/or was not well supported by information drawn from authoritative sources. | The introduction section was missing or did not present information about the cybersecurity industry. | |
Provided an excellent overview of the operational risks and sources of operational risks which could affect suppliers of cybersecurity related products and services. Addressed the potential impacts on products & services (compromised security). Discussed the potential impact of such compromises upon buyers and the security of buyers’ organizations (risk transfer). Appropriately used and cited information from 3 or more authoritative sources. | Provided an outstanding overview of the operational risks which could affect suppliers of cybersecurity related products and services. Addressed the potential impacts on products & services (compromised security). Discussed the potential impact of such compromises upon buyers and the security of buyers’ organizations (risk transfer). Appropriately used and cited information from 2 or more authoritative sources. | Discussed operational risks and sources of operational risks which could affect suppliers of cybersecurity related products and services. Addressed the possible impacts on products & services and the impacts upon the security of buyers’ organizations (risk transfer). Appropriately used and cited information from authoritative sources. | Provided information about operational risks and sources of operational risks which could impact sellers and buyers of cybersecurity products and services. Appropriately used and cited information from authoritative sources. | Provided a discussion of operational risk as it applies to the cybersecurity industry. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources. | This section was missing, off topic, or failed to provide information about operational risks and the impacts thereof. | |
Provided an excellent discussion of product liability in the cybersecurity industry. Summarized the current legal environment and discussed the potential impact upon buyers who suffer harm or loss as a result of purchasing, installing, and/or using cybersecurity products or services. Appropriately used information from 3 or more authoritative sources. | Provided an outstanding discussion of product liability in the cybersecurity industry. Summarized the current legal environment and discussed the potential impact upon buyers who suffer harm or loss as a result of purchasing, installing, and/or using cybersecurity products or services. Appropriately used information from 2 or more authoritative sources. | Discussed product liability in the cybersecurity industry. Summarized the current legal environment and discussed the potential impact upon buyers who suffer harm or loss as a result of purchasing, installing, and/or using cybersecurity products or services. The discussion was supported by information drawn from authoritative sources. | Attempted to provide a discussion of product liability in the cybersecurity industry. Mentioned the potential impact upon buyers who suffer harm or loss related to the use of cybersecurity products or services. The discussion was supported by information drawn from authoritative sources. | Mentioned product liability but the section was lacking in details and/or was not well supported by information from authoritative sources. | This section was missing, off topic, or failed to address product liability. | |
Provided an excellent discussion of the role that standards and governance processes should play in ensuring that acquisitions and procurements (purchases) of cybersecurity products and services meet the buyer’s security requirements. Discussed specific governance process examples from COBIT®,ITIL®, and ISO/IEC 27002. Appropriately used information from 3 or more authoritative sources. |
Provided an outstanding discussion of the role that standards and governance processes should play in ensuring that acquisitions and procurements (purchases) of cybersecurity products and services meet the buyer’s security requirements. Discussed specific governance process examples from two of the three frameworks (COBIT®, ITIL®, and ISO/IEC 27002). Appropriately used information from 2 or more authoritative sources.
|
Discussed the role that standards and governance processes should play in ensuring that acquisitions and procurements (purchases) of cybersecurity products and services meet the buyer’s security requirements. Mentioned the use of processes from COBIT®,ITIL®, or ISO/IEC 27002. Appropriately used information from authoritative sources.
|
Provided a discussion of the role that standards and governance processes should play during the purchase of cybersecurity products or services.Appropriately used information from authoritative sources. | Attempted to provide a discussion of the role that standards and governance processes should play during the purchase of cybersecurity products or services but the discussion was substantially lacking in details and/or was not well supported by information from authoritative sources. | Section was missing, off topic, or did not mention governance frameworks and standards. | |
Provided an excellent summary and conclusions section which presented a summary of findings including 3 or more reasons why product liability (risk transfer) is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services. | Provided an outstanding summary and conclusions section which presented a summary of findings including 2 or more reasons why product liability (risk transfer) is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services. | Provided a summary and conclusions section which presented a summary of findings including the reasons why product liability (risk transfer) is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services. | Summarized findings which mentioned product liability problems in the cybersecurity industry. | Included a summary but did not mention product liability and/or was not well supported by information from authoritative sources. | Summary and conclusions were missing. | |
Demonstrated excellence in the integration of standard cybersecurity terminology into the case study. | Provided an outstanding integration of standard cybersecurity terminology into the case study. | Integrated standard cybersecurity terminology into the into the case study | Used standard cybersecurity terminology but this usage was not well integrated with the discussion. | Misused standard cybersecurity terminology. | Did not integrate standard cybersecurity terminology into the discussion. | |
Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource. | Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries. | Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries. | Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries. | Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.). | Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper. | |
Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type. | Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions). | Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved. | Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement. | Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance. | No work submitted. | |
No formatting, grammar, spelling, or punctuation errors. | Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance. | Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work. | Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance. | Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage. | No work submitted. | |
Overall Score |
RUBRIC | |||
Excellent Quality
95-100%
|
Introduction
45-41 points The context and relevance of the issue, as well as a clear description of the study aim, are presented. The history of searches is discussed. |
Literature Support
91-84 points The context and relevance of the issue, as well as a clear description of the study aim, are presented. The history of searches is discussed. |
Methodology
58-53 points With titles for each slide as well as bulleted sections to group relevant information as required, the content is well-organized. Excellent use of typeface, color, images, effects, and so on to improve readability and presenting content. The minimum length criterion of 10 slides/pages is reached. |
Average Score
50-85% |
40-38 points
More depth/information is required for the context and importance, otherwise the study detail will be unclear. There is no search history information supplied. |
83-76 points
There is a review of important theoretical literature, however there is limited integration of research into problem-related ideas. The review is just partly focused and arranged. There is research that both supports and opposes. A summary of the material given is provided. The conclusion may or may not include a biblical integration. |
52-49 points
The content is somewhat ordered, but there is no discernible organization. The use of typeface, color, graphics, effects, and so on may sometimes distract from the presenting substance. It is possible that the length criteria will not be reached. |
Poor Quality
0-45% |
37-1 points
The context and/or importance are lacking. There is no search history information supplied. |
75-1 points
There has been an examination of relevant theoretical literature, but still no research concerning problem-related concepts has been synthesized. The review is just somewhat focused and organized. The provided overview of content does not include any supporting or opposing research. The conclusion has no scriptural references. |
48-1 points
There is no logical or apparent organizational structure. There is no discernible logical sequence. The use of typeface, color, graphics, effects, and so on often detracts from the presenting substance. It is possible that the length criteria will not be reached. |
Place the Order Here: https://standardwriter.com/orders/ordernow / https://standardwriter.com/