As a professor who teaches data modeling and database implementation, Dr. Jim Chen gets the technical side of information systems and all that goes into making them secure. But this longtime faculty ...
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a ...
This Written Information Security Program describes the safeguards implemented by DePauw University to protect confidential data. The goal of the program is to ensure the security of these assets to ...
The Office of Inspector General (OIG) at the Department of Homeland Security (DHS) has issued an unclassified statement regarding its classified work on DHS’s enterprise-wide security program for Top ...
Rende is the founder & CEO of Rhymetec, a cybersecurity firm providing cybersecurity, compliance and data privacy needs to SaaS companies. Businesses live and die by their budgets, so many ...
The Federal Trade Commission’s Standards For Safeguarding Customer Information Rule (aka The “FTC Safeguards Rule”) is a regulation requiring entities to develop, implement and maintain a ...
The effective implementation of a self-assessment process can increase the value of your information security program. You will get positive response when the program is working well and definite ...
Deficiencies in the Department of Homeland Security’s (DHS) information security program for intelligence systems may put the department at risk, according to a recent audit by DHS’ Office of the ...