FORT HUACHUCA, Ariz. – The Communications Security Logistics Activity, known as CSLA, plays a critical role as the Army's COMSEC Commodity Manager and Subject Matter Expert. CSLA’s mission is to ...
Ensuring the security of customers’ confidential data has never been more important for organizations and IT leaders. The Covid-19 pandemic introduced a new era of digital collaboration technology and ...
A security audit is an independent review and assessment of an organization’s security protocols, processes and systems. An outside party conducts the audit and typically includes a detailed review of ...
The HHS’ Office for Civil Rights’ audit program was too narrow in scope to effectively assess data protections and reduce cyber risks in the healthcare sector, according to the report. The report, ...
When I was asked earlier this year to write about the lessons from the audits performed under the Office for Civil Rights new audit program, I sat down and began to write. Having discussed this topic ...
This concentration equips students with skills and tools required to examine and evaluate an organization's information technology infrastructure, policies and operations. It focuses on the process of ...
Security weaknesses in the University of Wisconsin System’s IT infrastructure increase the risk it could be subject to a cyberattack or that student data could be exposed, a new state audit has found.
The management of information risk has become a significant topic for all organizations, small and large alike. But for the large, multi-divisional organization, it poses the additional challenge of ...
In examining how the Office of Civil Rights administered its periodic Health Insurance Portability and Accountability Act audit program from January 2016 through December 2020, the U.S. Department of ...
A lot of the work I do, especially for clients regulated by the Department of Labor (DOL), involves third-party risk reviews. In 2021, the DOL released a list of cybersecurity best practices. Now, in ...