As a professor who teaches data modeling and database implementation, Dr. Jim Chen gets the technical side of information systems and all that goes into making them secure. But this longtime faculty ...
The Office of Inspector General (OIG) at the Department of Homeland Security (DHS) has issued an unclassified statement regarding its classified work on DHS’s enterprise-wide security program for Top ...
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a ...
This Written Information Security Program describes the safeguards implemented by DePauw University to protect confidential data. The goal of the program is to ensure the security of these assets to ...
Rende is the founder & CEO of Rhymetec, a cybersecurity firm providing cybersecurity, compliance and data privacy needs to SaaS companies. Businesses live and die by their budgets, so many ...
Drug and device manufacturers are increasingly targeted by cyber threats that can compromise patient safety, intellectual property, and other critical data and systems, while also facing new ...
The Department of Veterans Affairs “continues to face significant challenges” in complying with the Federal Information Security Modernization Act—or FISMA—according to an audit released by the VA ...
The Information Security Program Maturity Model is a useful tool in understanding the degree of sophistication of information security processes, their reliability and effectiveness in identifying, ...
The management of information risk has become a significant topic for all organizations, small and large alike. But for the large, multi-divisional organization, it poses the additional challenge of ...
The Federal Trade Commission’s Standards For Safeguarding Customer Information Rule (aka The “FTC Safeguards Rule”) is a regulation requiring entities to develop, implement and maintain a ...
Business information exists in a complex ecosystem, teeming with a multitude of technologies, regulatory requirements, standards, business processes, vendors, security threats, system vulnerabilities, ...