DEVELOPING THE SECURITY PROGRAM

Size: px
Start display at page:

Download "DEVELOPING THE SECURITY PROGRAM"

Transcription

1 SECURITY MANAGEMENT CHAPTER 5 DEVELOPING THE SECURITY PROGRAM We trained hard but every time we formed up teams we would be reorganiz I was to learn that we meet any new situation by reorganizing. And a wonderful method it can be for creating the illusion of progress while producing confusion, inefficiency, and demoralization.

2 Objectives Chapter 5 Upon completion of this material you should be able to: Explain the organizational approaches to information security List and describe the functional components of an information security program Determine how to plan and staff an organization s information security program based on its size Evaluate the internal and external factors that influence the activities and organization of an information security program

3 Objectives (cont d.) Upon completion of this material you should be able to: (cont d.) List and describe the typical job titles and functions performed in the information security program Describe the components of a security education, training, and awareness program and explain how organizations create and manage these programs

4 Introduction Some organizations use security program to describe the entire set of personnel, plans, policies, and initiatives related to information security The term information security program is used here to describe the structure and organization of the effort that contains risks to the information assets of the organization

5 Organizing for Security Characteristics involved in structuring an information security program 1) Organizational culture 2) Size 3) Security personnel budget 4) Security capital budget As organizations increase in size: Their security departments are not keeping up with increasingly complex organizational infrastructures

6 Organizing for Security (cont d.) Information security departments tend to form internal groups To meet long-term challenges and handle day-today security operations Functions are likely to be split into groups Smaller organizations typically create fewer groups Perhaps having only one general group of specialists

7 Organizing for Security (cont d.) Very large organizations More than 10,000 computers Security budgets often grow faster than IT budgets Even with a large budgets, the average amount spent on security per user is still smaller than any other type of organization Small organizations spend more than $5,000 per user on security; very large organizations spend about 1/18th of that, roughly $300 per user

8 Organizing for Security (cont d.) Very large organizations (cont d.) Does a better job in the policy and resource management areas Only 1/3 of organizations handled incidents according to an IR plan Large organizations Have 1,000 to 10,000 computers Security approach has often matured, integrating planning and policy into the organization s culture

9 Organizing for Security (cont d.) Large organizations (cont d.) Do not always put large amounts of resources into security Considering the vast numbers of computers and users often involved They tend to spend proportionally less on security

10 Security in Large Organizations One approach separates functions into four areas: Functions performed by non-technology business units outside of IT Functions performed by IT groups outside of information security area Functions performed within information security department as customer service Functions performed within the information security department as compliance

11 Security in Large Organizations The CISO has responsibility for information security functions Should be adequately performed somewhere within the organization The deployment of full-time security personnel depends on: Sensitivity of the information to be protected Industry regulations General profitability (cont d.)

12 Security in Large Organizations (cont d.) The more money the company can dedicate to its personnel budget The more likely it is to maintain a large information security staff

13 Security in Large Organizations (cont d.) Figure 5-1 Example of information security staffing in a large organization Source: Course Technology/Cengage Learning

14 Security in Large Organizations (cont d.) Figure 5-2 Example of information security staffing in a very large organization Source: Course Technology/Cengage Learning

15 Security in Medium-Sized Organizations Medium-sized organizations Have between 100 and 1000 computers Have a smaller total budget Have same sized security staff as the small organization, but a larger need Must rely on help from IT staff for plans and practices Ability to set policy, handle incidents, and effectively allocate resources is worse than any other size

16 Security in Medium-Sized Organizations (cont d.) Medium-sized organizations (cont d.) May be large enough to implement a multi-tiered approach to security With fewer dedicated groups and more functions assigned to each group Tend to ignore some security functions

17 Security in Medium-Sized Organizations (cont d.) Figure 5-3 Example of information security staffing in a medium-sized organization Source: Course Technology/Cengage Learning

18 Security in Small Organizations Small organizations Have between 10 and 100 computers Have a simple, centralized IT organizational model Spend disproportionately more on security Information security is often the responsibility of a single security administrator Have little in the way of formal policy, planning, or security measures

19 Security in Small Organizations (cont d.) Small organizations (cont d.) Commonly outsource their Web presence or electronic commerce operations Security training and awareness is commonly conducted on a 1-on-1 basis Policies (when they exist) are often issue-specific Formal planning is often part of IT planning Threats from insiders are less likely Every employee knows every other employee

20 Security in Small Organizations (cont d.) Figure 5-4 Example of information security staffing in a smaller organization Source: Course Technology/Cengage Learning

21 Placing Information Security Within An Organization In large organizations InfoSec is often located within the information technology department Headed by the CISO who reports directly to the top computing executive, or CIO An InfoSec program is sometimes at odds with the goals and objectives of the IT department as a whole

22 Placing Information Security Within An Organization (cont d) Because the goals and objectives of the CIO and the CISO may come in conflict It is not difficult to understand the current movement to separate information security from the IT division The challenge is to design a reporting structure for the InfoSec program that balances the needs of each of the communities of interest

23 Placing Information Security Within An Organization (cont d) Figure 5-5 Wood s Option 1: Information security reports to information technology dept Source: From Information Security Roles and Responsibilities Made Easy, used with permission.

24 Placing Information Security Within An Organization (cont d) Figure 5-6 Wood s Option 2: Information security reports to broadly defined security dept Source: From Information Security Roles and Responsibilities Made Easy, used with permission.

25 Placing Information Security Within An Organization (cont d) Figure 5-7 Wood s Option 3: Information security reports to administrative services dept Source: From Information Security Roles and Responsibilities Made Easy, used with permission.

26 Placing Information Security Within An Organization (cont d) Figure 5-8 Wood s Option 4: Information security reports to insurance and risk management department Source: From Information Security Roles and Responsibilities Made Easy, used with permission.

27 Placing Information Security Within An Organization (cont d) Figure 5-9 Wood s Option 5: Information security reports to strategy and planning dept. Source: From Information Security Roles and Responsibilities Made Easy, used with permission.

28 Placing Information Security Within An Organization (cont d) Other options Option 6: Legal Option 7: Internal audit Option 8: Help desk Option 9: Accounting and finance through IT Option 10: Human resources Option 11: Facilities management Option 12: Operations

29 Components of the Security Program Organization s information security needs Unique to the culture, size, and budget of the organization Determining what level the information security program operates on depends on the organization s strategic plan Also the plan s vision and mission statements The CIO and CISO should use these two documents to formulate the mission statement for the information security program

30 Information Security Roles and Titles Types of information security positions Those that define Provide the policies, guidelines, and standards Do the consulting and the risk assessment Develop the product and technical architectures Senior people with a lot of broad knowledge, but often not a lot of depth Those that build The real techies who create and install security solutions

31 Information Security Roles and Titles (cont d.) Types of information security positions (cont d.) Those that administer Operate and administer the security tools and the security monitoring function Continuously improve the processes A typical organization has a number of individuals with information security responsibilities

32 Information Security Roles and While the titles used may be different, most of the job functions fit into one of the following: Chief Information Security Officer (CISO) or Chief Security Officer (CSO) Security managers Security administrators and analysts Security technicians Security staff Titles (cont d.)

33 Information Security Roles and Titles (cont d.) Figure 5-10 Information security roles Source: Course Technology/Cengage Learning

34 Help Desk Personnel Help desk An important part of the information security team Enhances the security team s ability to identify potential problems When a user calls the help desk with a complaint, the user s problem may turn out to be related to a bigger problem, such as a hacker, denial-of-service attack, or a virus

35 Help Desk Personnel (cont d.) Help desk (cont d.) Because help desk technicians perform a specialized role in information security, they have a need for specialized training

36 Implementing Security Education, Training, and Awareness Programs (SETA) SETA program Designed to reduce accidental security breaches Consists of three elements: security education, security training, and security awareness Awareness, training, and education programs offer two major benefits: Improving employee behavior Enabling the organization to hold employees accountable for their actions

37 Implementing SETA Programs (cont d.) Purpose of SETA is to enhance security: By building in-depth knowledge, to design, implement, or operate security programs for organizations and systems By developing skills and knowledge so that computer users can perform their jobs while using IT systems more securely By improving awareness of the need to protect system resources

38 Implementing SETA Programs (cont d.) Table 5-3 Framework of security education, training and awareness Source: National Institute of Standards and Technology. An Introduction to Computer Security: The NIST Handbook. SP

39 a) Security Education Employees within information security may be encouraged to seek a formal education If not prepared by their background or experience A number of institutions of higher learning, including colleges and universities, provide formal coursework in information security

40 Security Education (cont d.) A knowledge map Can help potential students assess information security programs Identifies the skills and knowledge clusters obtained by the program s graduates Creating the map can be difficult because many academics are unaware of the numerous subdisciplines within the field of information security Each of which may have different knowledge requirements

41 Security Education (cont d.) Figure 5-11 Information security knowledge map Source: Course Technology/Cengage Learning

42 Security Education (cont d.) Depth of knowledge Indicated by a level of mastery using an established taxonomy of learning objectives or a simple scale such as understanding accomplishment proficiency mastery. Because many institutions have no frame of reference for which skills and knowledge are required for a particular job area They may refer to the certifications offered in that field

43 Security Education (cont d.) Once the knowledge areas are identified, common knowledge areas are aggregated into teaching domains From which individual courses can be created Course design Should enable a student to obtain the required knowledge and skills upon completion of the program Identify the prerequisite knowledge for each class

44 Security Education (cont d.) Figure 5-12 Technical course progression Source: Course Technology/Cengage Learning

45 b) Security Training Involves providing detailed information and hands-on instruction To develop user skills to perform their duties securely Management can either develop customized training or outsource

46 Security Training (cont d.) Customizing training for users By functional background General user Managerial user Technical user By skill level Novice Intermediate Advanced

47 Training Techniques Using the wrong method Can hinder the transfer of knowledge Leading to unnecessary expense and frustrated, poorly trained employees Good training programs Take advantage of the latest learning technologies and best practices

48 Training Techniques (cont d.) Recent developments Less use of centralized public courses and more on-site training Training is often for one or a few individuals Waiting until there is a large-enough group for a class can cost companies lost productivity Other best practices Increased use of short, task-oriented modules Available during the normal work week

49 Training Techniques (cont d.) Selection of the training delivery method Not always based on the best outcome for the trainee Often overriden by budget, scheduling, and needs of the organization Types of delivery methods One-on-one Formal class Computer-based training (CBT)

50 Training Techniques (cont d.) Types of delivery methods (cont d.) Distance learning/web seminars User support group On-the-job training Self-study (non-computerized)

51 Training Techniques (cont d.) Training methods Use a local training program Use a continuing education department Use another external training agency Hire a professional trainer, a consultant, or someone from an accredited institution to conduct on-site training Organize and conduct training in-house using organization s own employees

52 Implementing Training 7-step methodology generally applies: Step 1: Identify program scope, goals, and objectives Step 2: Identify training staff Step 3: Identify target audiences Step 4: Motivate management and employees Step 5: Administer the program Step 6: Maintain the program Step 7: Evaluate the program

53 c) Security Awareness One of the least frequently implemented, but most effective security methods is the security awareness program Security awareness programs: Set the stage for training by changing organizational attitudes to realize the importance of security and the adverse consequences of its failure Remind users of the procedures to be followed

54 Security Awareness (cont d.) Best practices Focus on people Refrain from using technical jargon Use every available venue Define learning objectives, state them clearly, and provide sufficient detail and coverage Keep things light Don t overload the users Help users understand their roles in InfoSec

55 Security Awareness (cont d.) Best practices (cont d.) Take advantage of in-house communications media Make the awareness program formal Plan and document all actions Provide good information early, rather than perfect information late

56 Security Awareness (cont d.) The ten commandments of information security awareness training Information security is a people, rather than a technical, issue If you want them to understand, speak their language If they cannot see it, they will not learn it Make your point so that you can identify it and so can they. Never lose your sense of humor

57 Security Awareness (cont d.) The ten commandments of information security awareness training (cont d.) Make your point, support it, and conclude it Always let the recipients know how the behavior that you request will affect them Ride the tame horses Formalize your training methodology Always be timely, even if it means slipping schedules to include urgent information

58 Security Awareness (cont d.) Security awareness and security training are designed to modify any employee behavior that endangers the security of the organization s information Security training and awareness activities can be undermined if management does not set a good example

59 Security Awareness (cont d.) Effective training and awareness programs make employees accountable for their actions Dissemination and enforcement of policy become easier when training and awareness programs are in place Demonstrating due care and due diligence can help indemnify the institution against lawsuits

60 Security Awareness (cont d.) Awareness can take on different forms for particular audiences A security awareness program can use many methods to deliver its message Recognize that people tend to practice a tuning out process (acclimation) Awareness techniques should be creative and frequently changed

61 Security Awareness (cont d.) Many security awareness components are available at little or no cost Others can be very expensive Examples of security awareness components Videos Posters and banners Lectures and conferences Computer-based training

62 Security Awareness (cont d.) Examples of security awareness components (cont d.) Newsletters Brochures and flyers Trinkets (coffee cups, pens, pencils, T-shirts) Bulletin boards

63 Security Awareness (cont d.) Security newsletter A cost-effective way to disseminate security information Newsletters can be in the form of hard copy, e- mail, or intranet Topics can include threats to the organization s information assets, schedules for upcoming security classes, and the addition of new security personnel

64 Security Awareness (cont d.) Security newsletter (cont d.) The goal is to keep the idea of information security uppermost in users minds and to stimulate them to care about security Newsletters might include: Summaries of key policies Summaries of key news articles A calendar of security events, including training sessions, presentations, and other activities Announcements relevant to information security How-to s

65 Security Awareness (cont d.) Figure 5-13 SETA awareness components: Newsletters Source: Course Technology/Cengage Learning

66 Security Awareness (cont d.) Security poster series A simple and inexpensive way to keep security on people s minds Professional posters can be quite expensive, so inhouse development may be the best solution Keys to a good poster series: Varying the content and keeping posters updated Keeping them simple, but visually interesting Making the message clear Providing information on reporting violations

67 Security Awareness (cont d.) Figure 5-14 SETA awareness components: Posters Source: Course Technology/Cengage Learning

68 Security Awareness (cont d.) Trinket programs Inexpensive on a per-unit basis They can be expensive to distribute Types of trinkets Pens and pencils, mouse pads Coffee mugs, plastic cups Hats, T-shirts The messages trinket programs impart will be lost unless reinforced by other means

69 Security Awareness (cont d.) Figure 5-15 SETA awareness components: Trinkets Source: Course Technology/Cengage Learning

70 Security Awareness (cont d.) Organizations can establish Web pages or sites dedicated to promoting information security awareness The challenge lies in updating the messages frequently enough to keep them fresh Tips on creating and maintaining an educational Web site See what s already out there Plan ahead

71 Security Awareness (cont d.) Tips on creating and maintaining an educational Web site (cont d.) Keep page loading time to a minimum Seek feedback Assume nothing and check everything Spend time promoting your site

72 Security Awareness (cont d.) Security awareness conference Have a guest speaker or even a mini-conference dedicated to the topic Perhaps in association with the semi-annual National Computer Security Days: October 31 and April 4

73 Summary Introduction Organizing for security Placing information security within an organization Components of the security program Information security roles and titles Implementing security education, training, and awareness programs

Structuring Security for Success

Structuring Security for Success University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Innovation in Pedagogy and Technology Symposium Information Technology Services 2018 Structuring Security for Success Matt

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

Information Security Awareness Guidelines Document Number: OIL-IS-GUD-ISA

Information Security Awareness Guidelines Document Number: OIL-IS-GUD-ISA Information Security Awareness Guidelines Document Number: OIL-IS-GUD-ISA Document Details Title Description Version 2.0 Author Classification Information Security Awareness Guidelines Guideline This document

More information

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec. National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity

More information

How To Reduce the IT Budget and Still Keep the Lights On

How To Reduce the IT Budget and Still Keep the Lights On How To Reduce the IT Budget and Still Keep the Lights On By Charles Williams and John Carnegie CIOs are now more challenged than ever to demonstrate mature financial management disciplines, greater transparency,

More information

SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION

SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION POSITION: CHIEF OPERATING OFFICER FUNCTION: Responsible for all aspects of the SLV POA day-to-day operations. In this capacity,

More information

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst

More information

Security Awareness Compliance Requirements. Updated: 11 October, 2017

Security Awareness Compliance Requirements. Updated: 11 October, 2017 Security Awareness Compliance Requirements Updated: 11 October, 2017 Executive Summary The purpose of this document is to identify different standards and regulations that require security awareness programs.

More information

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy.

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager. https://www.2passeasy. Exam Questions CISM Certified Information Security Manager https://www.2passeasy.com/dumps/cism/ 1.Senior management commitment and support for information security can BEST be obtained through presentations

More information

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Exam4Tests.   Latest exam questions & answers help you to pass IT exam test easily Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : CISM Title : Certified Information Security Manager Vendor : ISACA Version : DEMO 1 / 10

More information

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product. Isaca EXAM - CISM Certified Information Security Manager Buy Full Product http://www.examskey.com/cism.html Examskey Isaca CISM exam demo product is here for you to test the quality of the product. This

More information

a publication of the health care compliance association MARCH 2018

a publication of the health care compliance association MARCH 2018 hcca-info.org Compliance TODAY a publication of the health care compliance association MARCH 2018 On improv and improving communication an interview with Alan Alda This article, published in Compliance

More information

How Cisco IT Improved Development Processes with a New Operating Model

How Cisco IT Improved Development Processes with a New Operating Model How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

The Information Technology Program (ITS) Contents What is Information Technology?... 2

The Information Technology Program (ITS) Contents What is Information Technology?... 2 The Information Technology Program (ITS) Contents What is Information Technology?... 2 Program Objectives... 2 ITS Program Major... 3 Web Design & Development Sequence... 3 The Senior Sequence... 3 ITS

More information

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Lecture 3 Information Security Policy Jan 29, 2008 Introduction Information security policy: What it is How to write it How to implement it How to maintain it Policy

More information

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System EVALUATION AND APPROVAL OF AUDITORS Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System 1 TABLE OF CONTENTS 1. Scope and field of Application 3 2. Normative

More information

Rethinking Information Security Risk Management CRM002

Rethinking Information Security Risk Management CRM002 Rethinking Information Security Risk Management CRM002 Speakers: Tanya Scott, Senior Manager, Information Risk Management, Lending Club Learning Objectives At the end of this session, you will: Design

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

Audit Challenges and Best Practices in a Research University Environment

Audit Challenges and Best Practices in a Research University Environment NSAA Annual Conference Jeffrey Huskamp Vice President and CIO University of Maryland, College Park Carnegie Doctoral/Research University Extensive 18 th ranked public university (US News) Celebrated 150

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

Program Review for Information Security Management Assistance. Keith Watson, CISSP- ISSAP, CISA IA Research Engineer, CERIAS

Program Review for Information Security Management Assistance. Keith Watson, CISSP- ISSAP, CISA IA Research Engineer, CERIAS Program Review for Information Security Management Assistance Keith Watson, CISSP- ISSAP, CISA IA Research Engineer, CERIAS Disclaimer and Purpose PRISMA, FISMA, and NIST, oh my! PRISMA versus an Assessment

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

National Defense University and IRMC. National Defense University

National Defense University and IRMC. National Defense University The Forgotten Information Assurance Professional - Educating the Senior IT Manager Robert C. Norris, Jr. Information Resources Management College National Defense University 1 Overview Intro to IRMC and

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

PMP Certification Program

PMP Certification Program PMP Certification Program 4 Days Classroom Training PHILIPPINES :: MALAYSIA :: VIETNAM :: SINGAPORE :: INDIA Content PMP CERTIFICATION PROGRAM Introduction Who are we Our Clients Course Overview Certification

More information

Hong Kong Accountability Benchmarking Micro-Study. Nymity Accountability Workshop 10 June 2015, Office of the PCPD, Hong Kong

Hong Kong Accountability Benchmarking Micro-Study. Nymity Accountability Workshop 10 June 2015, Office of the PCPD, Hong Kong Hong Kong Accountability Benchmarking Micro-Study Nymity Accountability Workshop 10 June 2015, Office of the PCPD, Hong Kong Interactive Workshop What we will do: Your participation: Provide background

More information

Project Management Professional (PMP) Certificate

Project Management Professional (PMP) Certificate Project Management Professional (PMP) Certificate www.hr-pulse.org What is PMP Certificate HR Pulse has the Learning Solutions to Empower Your People & Grow Your Business Project Management is a professional

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Management Information Systems. B15. Managing Information Resources and IT Security

Management Information Systems. B15. Managing Information Resources and IT Security Management Information Systems Management Information Systems B15. Managing Information Resources and IT Security Code: 166137-01+02 Course: Management Information Systems Period: Spring 2013 Professor:

More information

Figure 11-1: Organizational Issues. Managing the Security Function. Chapter 11. Figure 11-1: Organizational Issues. Figure 11-1: Organizational Issues

Figure 11-1: Organizational Issues. Managing the Security Function. Chapter 11. Figure 11-1: Organizational Issues. Figure 11-1: Organizational Issues 1 Managing the Security Function Chapter 11 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Top Management Support Top-Management security awareness briefing (emphasis on brief)

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT Buy: http://www.globalmanagergroup.com/iso27001training.htm Chapter-1.0 CONTENTS OF ISO 27001-2005

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

The Quest for Independence - Information Security Management Pyramid. Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc.

The Quest for Independence - Information Security Management Pyramid. Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc. 1 1. Introduction The Quest for Independence - Information Security Management Pyramid Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc. team The current state of global cybersecurity remains chaotic

More information

CISO as Change Agent: Getting to Yes

CISO as Change Agent: Getting to Yes SESSION ID: CXO-W02F CISO as Change Agent: Getting to Yes Frank Kim Chief Information Security Officer SANS Institute @fykim Outline Catch the Culture Shape the Strategy Build the Business Case 2 #1 Catch

More information

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

MAKING SECURITY AWARENESS HAPPEN: APPENDICES

MAKING SECURITY AWARENESS HAPPEN: APPENDICES 82-01-04 DATA SECURITY MANAGEMENT MAKING SECURITY AWARENESS HAPPEN: APPENDICES Susan Hansche, CISSP INSIDE Instructional Strategies (Training Delivery Methods); Suggested IT System Security Training Courses

More information

How to Become a CMA (Certified Management Accountant) May 10, 2017

How to Become a CMA (Certified Management Accountant) May 10, 2017 How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 17 Now, let us talk about the spheres of security

More information

1 Introduction 39748_BMP MALC 01 Chapter 1.indd 1 07/05/ :06

1 Introduction 39748_BMP MALC 01 Chapter 1.indd 1 07/05/ :06 Introduction 39748_BMP MALC 01 Chapter 1.indd 1 1 07/05/2014 16:06 3 1 Introduction The ITIL best-practice framework provides guidance on how people, processes and technology can enhance the quality of

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to

More information

ITIL Managing Across the Lifecycle Course

ITIL Managing Across the Lifecycle Course ITIL Managing Across the Lifecycle Course Duration: 5 Days Course Delivery: Classroom Language: English Course Overview ITIL 2011 edition is comprised of five core publications: Service Strategy, Service

More information

DEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for

DEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for DEPARTMENT OF HEALTH and HUMAN SERVICES HANDBOOK for FEDERAL ACQUISITION CERTIFICATION PROGRAM/PROJECT MANAGERS Issuer Office of the Secretary Office of the Assistant Secretary for Financial Resources

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

NFPA Edition

NFPA Edition NFPA 1035-2015 Edition Prerequisite Public Fire and Safety Educator I A completed application and payment plan are required one week before taking the Public Fire Life Safety Educator II Certification

More information

Managing intranets: opportunities and challenges

Managing intranets: opportunities and challenges 1 Managing intranets: opportunities and challenges IN THIS CHAPTER: Life in a workflow world The intranet opportunity Life as an intranet manager The challenges of intranet management A framework for intranet

More information

White Paper. How to Write an MSSP RFP

White Paper. How to Write an MSSP RFP White Paper How to Write an MSSP RFP https://www.solutionary.com (866) 333-2133 Contents 3 Introduction 3 Why a Managed Security Services Provider? 5 Major Items to Consider Before Writing an RFP 5 Current

More information

Healthcare Security Success Story

Healthcare Security Success Story Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story

More information

FOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013

FOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013 Deanna Williams FOUNDED 1980 In 1980, a group of professional and occupational regulators and private sector representatives met in New Orleans to discuss their need to share information. GOAL of New ORGANIZATION

More information

The Business Case for Web Accessibility. Facilitator s Notes for this Module

The Business Case for Web Accessibility. Facilitator s Notes for this Module The Business Case for Web Accessibility About this Module: Goal: In this module we will review how an accessible website can benefit your business or organization Format: PowerPoint presentation Time:

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

Audit and Compliance Committee - Agenda

Audit and Compliance Committee - Agenda Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796

More information

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation

More information

Cybersecurity and Examinations

Cybersecurity and Examinations Tim Segerson, Deputy Director NCUA E&I Cybersecurity and Examinations October 6, 2016 Chicago, IL Connected Devices Declining costs + increased bandwidth + powerful algorithms will spur a new information

More information

How to Write an MSSP RFP. White Paper

How to Write an MSSP RFP. White Paper How to Write an MSSP RFP White Paper Tables of Contents Introduction 3 Benefits Major Items of On-Premise to Consider SIEM Before Solutions Security Writing an RFP and Privacy 45 Benefits Building an of

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Lakeshore Technical College Official Policy

Lakeshore Technical College Official Policy Policy Title Original Adoption Date Policy Number Information Security 05/12/2015 IT-720 Responsible College Division/Department Responsible College Manager Title Information Technology Services Director

More information

It s Not If But When: How to Build Your Cyber Incident Response Plan

It s Not If But When: How to Build Your Cyber Incident Response Plan CYBER SECURITY USA It s Not If But When: How to Build Your Cyber Incident Response Plan Lucie Hayward, Managing Consultant Michael Quinn, Associate Managing Director each day seems to bring news of yet

More information

TEXAS CISO COUNCIL. Information Security Program Essentials Guide

TEXAS CISO COUNCIL. Information Security Program Essentials Guide TEXAS CISO COUNCIL Information Security Program Essentials Guide Presentation Overview Challenge The Security Framework and Compliance Overload The Importance of Having (And Sticking To) a Security Framework

More information

SECURITY TRAINING SECURITY TRAINING

SECURITY TRAINING SECURITY TRAINING SECURITY TRAINING SECURITY TRAINING Addressing software security effectively means applying a framework of focused activities throughout the software lifecycle in addition to implementing sundry security

More information

AGENCY TOTAL-Capital $443,719 $482,493 $492,143 $501,986 AGENCY TOTAL-Informational $4,516,842 $4,574,381 $4,665,867 $4,759,185

AGENCY TOTAL-Capital $443,719 $482,493 $492,143 $501,986 AGENCY TOTAL-Informational $4,516,842 $4,574,381 $4,665,867 $4,759,185 78 th Regular Session, Agency Submission, Version 1 TIME: 10:07:41AM Automated Budget and Evaluation System of Texas (ABEST) PAGE: 1 of 2 Category CODE / Category Name Project Number / Name OOE / TOF /

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support Workshop IT Star 2016 IT Security Professional Positioning and Monitoring: e-cfplus support Roberto Bellini AICA-Milan October, 28 th 2016 agenda 1. e-cf standard and the enriched e-cfplus System 2. IT

More information

Post-Secondary Institution Data-Security Overview and Requirements

Post-Secondary Institution Data-Security Overview and Requirements Post-Secondary Institution Data-Security Overview and Tiina K.O. Rodrigue, EdDc, CISSP, CISM, PMP, CSM, CEA, ITIL, ISC2 Compliance Mapper, A+ Senior Advisor Cybersecurity - 2017 Agenda Who needs to worry

More information

Global Voic Cutover

Global Voic Cutover Global Voicemail Cutover How Cisco IT Used Communications Plan to Ensure Smooth Cutover to Global Voicemail System A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Develop communications

More information

Position Title: IT Security Specialist

Position Title: IT Security Specialist Position Title: IT Security Specialist SASRIA SOC LIMITED Sasria, a state-owned company, is the only short-term insurer in South Africa that provides affordable voluntary cover against special risks such

More information

SCHEME OF DELEGATION (Based on the model produced to the National Governors Association)

SCHEME OF DELEGATION (Based on the model produced to the National Governors Association) SCHEME OF DELEGATION (Based on the model produced to the National Association) THE PURPOSE OF A SCHEME OF DELEGATION: A scheme of delegation (SoD) is the key document defining which functions have been

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

Planning and Implementing ITIL in ICT Organisations

Planning and Implementing ITIL in ICT Organisations CCPM Solutions Experts in ICT Performance Supporting Your Business Planning and Implementing ITIL in ICT Organisations June 2012, Addis Ababa Content 1. Quick ITIL (Overview) 2. Case study (How not to

More information

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change Senate Meeting of April 28, 2010 Graduate Studies Committee Hegis Code: 0502 Program Code: 32786 LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK Department of Economics and Business Curriculum Change

More information

CISO Success Strategies: On Becoming a Security Business Leader

CISO Success Strategies: On Becoming a Security Business Leader SESSION ID: CXO W03 CISO Success Strategies: On Becoming a Security Business Leader Frank Kim CISO SANS Institute @fykim Outline Build Your Business Case Rocket Your Relationships Master Your Message 2

More information

Guide to Network Security First Edition. Chapter One Introduction to Information Security

Guide to Network Security First Edition. Chapter One Introduction to Information Security Guide to Network Security First Edition Chapter One Introduction to Information Security About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM

QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM DEPARTMENT OF CONSTRUCTION MANAGEMENT AND CIVIL AND CONSTRUCTION ENGINEERING QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM Updated 5/17 Organization The QIP consists of

More information

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS (ISC) 2 CISSP Recertification Guidelines (rev. 8-06) Page 1 of 16 CONTENTS Introduction... 3 CPE Record Keeping... 4 CPE Credit

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden

Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden I. Background Information The mission of Gerri Holden Ministries is to provide academic programs

More information

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology

More information

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2014-2015 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of October 26, 2013 Computing

More information

National Open Source Strategy

National Open Source Strategy National Open Source Strategy Ministry of Communications & Information Technology - Egypt June 2014 Outline Background Vision & Mission Preliminary Targets Strategic Objectives Enablers Ministry of Communications

More information

International Institute of Islamic Thought. Request for Proposals. for

International Institute of Islamic Thought. Request for Proposals. for International Institute of Islamic Thought Request for Proposals for Graphic design services for the development of a new Visual Identity for the International Institute of Islamic Thought (IIIT) Date

More information