A consultant colleague recently reached out with some questions on how to craft a good organizational information security policy. I’ve got experience with this, as a graduate-level legal instructor, ...
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a ...
This website addresses common questions from the campus community about the University of Dayton's Information Security Policy. If anything in the policy or this FAQ is unclear, or you’d like more ...
The purpose of this policy is to establish the minimum requirements for an information security awareness and training program at W&M. This policy applies to all William & Mary faculty and staff ...
Archimedes famously said the quickest route between two points is a straight line. He meant geometry, though I argue this concept applies seamlessly to data security. To secure data in enterprise ...
Data protection concept reflecting the pivotal role of information security controls for companies. We often hear how poor data security can bring a business to its knees. It’s a worthwhile narrative; ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results