News

Regarding strategy, most of our attendees rated themselves quite low in having a documented strategy for their information security program; only about 30% of the workshop attendees said they had ...
Before you can scale your information security program, you need to understand your current state and identify your strengths, weaknesses, gaps, and risks. You can use various tools and frameworks ...
The approach is iterative in nature and allows an organization to incrementally build a security program using a risk-based approach to implementation. Figure 1. Approach for incrementally building a ...
Security levels for sensitive government information and assets Protected information and assets. Applies to information or assets that, if compromised, could reasonably be expected to cause injury to ...
Information technology (IT) security requirements are designed to safeguard the confidentiality, integrity and availability of protected and classified information. IT security is required for ...
Once you have completed the Graduate Certificate - Information Security, you may apply to the Master of Science - Information Systems (MScIS) program. If you're admitted within 7 years, your Graduate ...
OIG officials said the CFPB’s information security program continues to operate effectively at a level 4 (managed and measurable) maturity. “We found that the CFPB has taken several steps to ...
Under federal, state, regulatory, and contractual requirements, Michigan Tech is responsible for developing and implementing a comprehensive information security program. The purpose of this document ...