As a professor who teaches data modeling and database implementation, Dr. Jim Chen gets the technical side of information systems and all that goes into making them secure. But this longtime faculty ...
The Office of Inspector General (OIG) has reviewed the Department of Homeland Security’s (DHS) information security program for compliance with Federal Information Security Modernization Act of 2014 ...
This Written Information Security Program describes the safeguards implemented by DePauw University to protect confidential data. The goal of the program is to ensure the security of these assets to ...
The University at Buffalo Data Technology Office (UBIT)’s Information Security Program identifies and describes goals, expectations, roles, and responsibilities with respect to information security ...
Two new publications issued by the National Institute of Standards and Technology (NIST) will help senior executives, auditors and others in federal agencies better understand how to manage, support, ...
The information security program of the United States’ Department of Health and Human Services (HHS) has been deemed ineffective for a fourth consecutive year. Audits conducted for the HHS’ Office of ...
The management of information risk has become a significant topic for all organizations, small and large alike. But for the large, multi-divisional organization, it poses the additional challenge of ...
Expertise from Forbes Councils members, operated under license. Opinions expressed are those of the author. Every organization, regardless of size or the revenue it generates, needs a security program ...
As threat actors continue to evolve, so does the tooling that protects a firm’s environment. In addition to training, security advisories should be distributed on a regular basis, and security ...
An Inspector General’s report has identified weaknesses with the Civil Division’s Mega Network Operations Center (MEGANOC) system information security program. An audit was performed by KPMG to ...
A lot of the work I do, especially for clients regulated by the Department of Labor (DOL), involves third-party risk reviews. In 2021, the DOL released a list of cybersecurity best practices. Now, in ...
The Trump administration wants access to state driver’s license data on millions of U.S. residents as it builds a powerful ...