Find an example of an information security plan from a business or industry that you are interested. While plans from private businesses may be difficult to source, many public businesses and governmental organizations will publish them. Do not report on the entirety of the plan, but instead select a portion that you find to be interesting or excellent in its implementation