The purpose of this policy is to ensure that all Connecticut College employees and college affiliates with access to college data, are taught Information Security Awareness in order to gain an ...
This policy is to establish a university standard on approved use of Social Security Numbers (SSN) in Case Western Reserve University (CWRU) administrative processes, and procedures for the proper use ...
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a ...
This website addresses common questions from the campus community about the University of Dayton's Information Security Policy. If anything in the policy or this FAQ is unclear, or you’d like more ...
A consultant colleague recently reached out with some questions on how to craft a good organizational information security policy. I’ve got experience with this, as a graduate-level legal instructor, ...
Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the Board’s role in cybersecurity and technology. As businesses automate operations and interact digitally ...
A look back at recent data breaches including the Hydraq attacks exposes an alarming trend that only a handful of security experts anticipated. As predicted by some as early as 2005, Internet ...
The title of Chief Information Security Officer, or CISO, emerged during the 1990s as the first large-scale cyber attacks started to occur. Since then, it's become a near-ubiquitous role in any large ...