Under federal, state, regulatory, and contractual requirements, Michigan Tech is responsible for developing and implementing a comprehensive information security program. The purpose of this document ...
This procedure outlines basic controls required for all Internal Use Only information (IUO), including paper files and IT devices, systems processing, storing, or transmitting Internal Use Only.
The Department of Veterans Affairs “continues to face significant challenges” in complying with the Federal Information Security Modernization Act—or FISMA—according to an audit released by the VA ...
The Information Security Policy is the umbrella policy for a framework of standards that provides specific requirements around use of RIT information assets. Compliance with the standards ensures that ...
A lot of the work I do, especially for clients regulated by the Department of Labor (DOL), involves third-party risk reviews. In 2021, the DOL released a list of cybersecurity best practices. Now, in ...
As organizations pursue cost savings and operational efficiencies with their existing business processes, they often turn to service providers either in their home countries or abroad to reap ...
The Australian Signals Directorate (ASD) Essential Eight strategies for mitigating cyber attacks, and a focus on risk management, are at the core of the Australian government's latest Information ...
Colleen Valentine is the Head of Information Security Governance and Compliance, reporting to Nasdaq’s Chief Information Security Officer. Colleen is responsible for the “softer”, people side of ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results