The United States Office of Management and Budget (“OMB”) recently issued a Compliance Supplement for 2019 that includes, for the first time, audit objectives for colleges and universities concerning ...
How often have your information security budget proposals been brushed aside or rejected outright by top management? This happens all the time in most organizations, as information security is ...
Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective. An information security policy is the cornerstone of an ...
To assist the Division of Information Technology in achieving its vision, Information Security MUST be considered by each and every member of the University community. So, what is Information Security ...
Key Performance Indicators (KPIs) are of crucial importance for telling if an organization is on the right path toward achieving its goals. A framework called the Balanced Scorecard has been around ...
With what seems like a never-ending stream of cybersecurity attacks, corporate boards and executives are searching for that “silver bullet” to protect them from the universe of threats. Unfortunately, ...
An information security policy is the foundation of an enterprise security program, ideally establishing in clear language what the organization expects from its security operations based on both its ...