This Written Information Security Program describes the safeguards implemented by DePauw University to protect confidential data. The goal of the program is to ensure the security of these assets to ...
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a ...
As a professor who teaches data modeling and database implementation, Dr. Jim Chen gets the technical side of information systems and all that goes into making them secure. But this longtime faculty ...
Tax and accounting professionals have a new resource for implementing or improving their written information security plan, which is required under federal law. The IRS in a news release Tuesday ...
The National Institute of Standards and Technology (NIST) Special Publication (SP) SP 800-53 provides a unified information security framework to achieve information system security and effective risk ...
The agency lacks comprehensive plans for IT security and hasn't had steady leadership in charge of protecting its assets, a new report says. NASA's individual centers might be protected, but its ...
A lot of the work I do, especially for clients regulated by the Department of Labor (DOL), involves third-party risk reviews. In 2021, the DOL released a list of cybersecurity best practices. Now, in ...
Robert L. Otto, vice president of IT at the U.S. Postal Service, talked recently with Computerworld reporter Dan Verton. Here, he describes a three-year plan to secure the mail service’s ...
The Social Security Administration should centralize and tighten controls over its cybersecurity management and provide enough authority to the agency’s chief information officer to carry out those ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results