Under federal, state, regulatory, and contractual requirements, Michigan Tech is responsible for developing and implementing a comprehensive information security program. The purpose of this document ...
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a ...
Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the Board’s role in cybersecurity and technology. Information security governance is the guiding hand that ...
The increased importance and complexity of securing the government's data have resulted in a steady expansion of the influence and scope of the information security function. In reaction, most federal ...
"Even bigger data can mean bigger opportunities but may also present bigger risks. We are constantly balancing these factors." — Kent Wada The concepts of privacy and information security often become ...
For information security professionals, collaborating with data architects ought to be an absolute imperative, and done well, has many benefits. Collaboration that is outcome-based and ...
The information security function is not an island, or an ivory tower. Omdia (as Ovum) has long focused on the big picture of cyber security – technology as one of the triumvirate of people, process ...
With five years of experience as a writer and editor in the higher education and career development space, Ilana has a passion for creating accessible, relevant content that demystifies the higher-ed ...
Ninety-six percent of UK businesses fear that their information security functions do not fully meet their needs, a survey from consultancy EY has revealed. This is despite the majority (66 percent) ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results