Director, IT Security District Office Kern Community College District JOB DESCRIPTION
|
|
|
- Dennis Carpenter
- 9 years ago
- Views:
Transcription
1 Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures, policies, strategies and standards in the management of the district s IT Security program. Key Accountabilities Relative to the district s IT Security, the Director of IT Security will be held accountable for the following: Assessing risks, threats, technologies, architecture (25% of time)* Recommending improvement strategies for identified gaps (25%) Developing, coordinating and leading Incident Response (5%) Developing an IT Security Plan and Policies (5%) Monitoring and compliance (15%) Implementing an End-user education and awareness program (5%) *This is the expected percentage of time required to perform each Key Accountability for this job. These percentages may vary over time dependent on the needs of the organization. Note, only 80% of the job s actual work time is used to assign time percentages. It is expected that 20% of the work time will be used for miscellaneous tasks. Examples of Duties 1. Work with KCCD academic and business units to facilitate IT risk assessment and risk management processes; this includes identifying location, type, sensitivity, ownership and access requirements for data being used by KCCD 2. Monitor the external threat environment for emerging threats and advise on appropriate course of action 3. Research, identify, coordinate and play key role in the implementation of appropriate IT security systems, technology and controls including firewalls, intrusion detection/prevention and vulnerability scanners. 4. Research and disseminate amongst District Office and campus IT personnel IT security best practices and resource information. Page 1 of 5
2 Examples of Duties (continued) 5. Develop, implement and manage district wide IT security incident response processes and procedures 6. Develop, implement and maintain a district wide IT security plan to ensure the integrity and confidentiality of information residing in KCCD workstations, servers, mobile devices and related computer peripherals 7. Develop, implement, maintain, disseminate and oversee enforcement of IT security related policies and procedures 8. Maintain an in-depth technical documentation repository of KCCD systems, networks and core applications 9. Coordinate, report on, document and act on results of periodic (annual) district wide IT security audits 10. Develop and implement strategies for complying with applicable Federal, State and other legal compliance requirements related to IT Security. 11. Develop, implement and manage a district wide IT security awareness and training program 12. Assist with the development and implementation of business continuity and disaster recovery plans 13. Participate as a member of KCCD s IT management team in the development, prioritizing, budgeting and planning of IT security strategies and related initiatives 14. Develop and communicate current IT security posture status, IT security strategies, and progress on IT security initiatives to key organizational units executive management and KCCD s Board of Trustees 15. Collaborate with other colleges and universities to share information or resources, as necessary, and to improve overall security of the higher education sector 16. Keep current with IT security industry research and best practices related to keeping an organization s IT systems and networks appropriately secure. This includes attending conferences and training as required to maintain IT security management proficiency 17. Develop and manage relationships with IT security vendors and consultants and recommend as appropriate solutions and partnerships that would benefit KCCD in its IT security efforts 18. Serve on and chair IT Security related District committees as appropriate 19. Perform other duties as assigned Page 2 of 5
3 Minimum Qualifications Bachelor s degree in an IT related field. Five years of experience in IT Networks, Systems or Security related positions. Desired Qualifications: Certifications such as CISSP (Certified Information System Security Professional), CISM (ISACA Certified Information Security Manager) or CISA (ISACA Certified Information Security Auditor) are preferred. Knowledge and Abilities Ability to identify, analyze, prioritize and communicate impact of IT security risks and exposures Understanding of effective IT security system and network architectures, concepts, techniques and tools Understanding and experience managing network and system security components such as firewalls and intrusion detection/prevention systems Experience in organizing, prioritizing, developing, implementing and communicating status on IT security strategies and projects Proficiency in IT security management, industry best practices and standards Experience developing and implementing IT security policies and procedures Experience in and knowledge of IT security auditing and monitoring Knowledge of and experience meeting applicable IT security related laws and regulations Ability to develop, learn and implement new concepts, technologies and methods. Knowledge of and exposure in developing and testing business continuity and disaster recovery plans Exposure to the operation of institution wide networks, systems and applications Ability to follow-up and follow-through in a coordinating role across multiple constituencies to achieve tactical and strategic goals Excellent analytical, planning and organizational skills Page 3 of 5
4 Knowledge and Abilities (continued) Agility in adapting to and thriving in a dynamic work environment including shifting of project objectives, deadlines, resources and priorities Ability to work effectively with administrators, faculty and staff Excellent oral and written communication skills Self-directed/driven Working Conditions Environment: Office Physical Demands: Incorporated within one (1) or more of the previously mentioned essential functions of this job description are essential physical requirements. The ratings in the chart below indicate the percentage of time spent on each of the essential physical requirements. Seldom Less than 25 percent = 1 Often percent = 3 Occasional percent = 2 Very Frequent 76 percent and above = 4 Ratings Essential Physical Requirements 4 Ability to work at a desk, conference table or in meetings of various configurations 1 Ability to stand for extended periods of time. 4 Ability to sit for extended periods of time. 4 Ability to see for purposes of reading printed matter 4 Ability to hear and understand speech at normal levels. 4 Ability to communicate so others will be able to clearly understand a normal conversation. 1 Ability to lift 10 pounds. 1 Ability to carry 10 pounds. 4 Ability to operate office equipment. Page 4 of 5
5 Status/Rationale This is a classified administrator position. Signature/Approval (Employee s Signature) (Date) (Supervisor s Signature) (Date) Page 5 of 5
How To Be A Security Officer
POSITION DESCRIPTION PROPOSED TITLE: Chief Information Security Officer CATEGORY: Administrative ETENDED TITLE: Chief Information Security Officer FLSA STATUS: Exempt GRADE: E JOB SUMMARY: Responsible
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
How To Be A Data Security Analyst
DATE ISSUED: 08/15 JOB DESCRIPTION TITLE Data Security Analyst JOB SUMMARY The Data Security Analyst performs two core functions for the enterprise. The first is the day-today operations of the in-place
College Human Resources Manager Bakersfield College~Cerro Coso College~Porterville College Kern Community College District JOB DESCRIPTION
College Human Resources Manager Bakersfield College~Cerro Coso College~Porterville College Kern Community College District JOB DESCRIPTION Definition Under the direction of the Vice Chancellor, Human Resources,
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
FRESNO COUNTY OFFICE OF EDUCATION CLASSIFIED MANAGEMENT POSITION Effective: October 1, 2015
JCN: 192 EXEMPT FRESNO COUNTY OFFICE OF EDUCATION CLASSIFIED MANAGEMENT POSITION Effective: October 1, 2015 CLASS TITLE: DIRECTOR - APPLICATION DEVELOPMENT AND SUPPORT BASIC FUNCTION: Under the direction
INFORMATION SYSTEMS ANALYST III
INFORMATION SYSTEMS ANALYST III DEFINITION Under general direction, performs a variety of complex professional technical and analytical duties in the design, oversight, coordination and operation of multiple
CLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
SYSTEMS AND NETWORK SECURITY ANALYST (Range 127)
(Range 127) DEFINITION Perform a variety of information assurance/security responsibilities in support of the Library District, including assessing, tracking, reporting, and correcting vulnerabilities
II. Supports the department in implementing the strategy established by management.
Position Description: Network Security Engineer Department: Information Technology Division: Information Technology FLSA: Exempt Location: Griffiss Revised: January 2016 Overview: The Network Security
IT Risk & Security Specialist Position Description
Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
Mott Community College Job Description
Title: Department: Information Technology Services Reports To: Chief Technology Officer Date Prepared/Revised: May 2009/Revised July 2011 Purpose, Scope & Dimension of Job: The role of the Director of
TRUCKEE DONNER RECREATION & PARK DISTRICT INFORMATION TECHNOLOGY ADMINISTRATOR
TRUCKEE DONNER RECREATION & PARK DISTRICT INFORMATION TECHNOLOGY ADMINISTRATOR Open Recruitment APPLICATION PROCESS/DUE DATE: Applicants must submit a completed Truckee Donner Recreation & Park District
LAS VEGAS - CLARK COUNTY LIBRARY DISTRICT
DEFINITION SYSTEMS AND NETWORK SUPERVISOR (Range 128) Performs installation, monitoring, maintenance, operations, optimization, supervision and modification of network, minicomputer and microcomputer systems
IT Security in Higher Education Survey Questionnaire
IT Security in Higher Education Survey Questionnaire Thank you for your participation in the EDUCAUSE Center for Applied Research (ECAR) study on IT Security in Higher Education. The study will cover the
SC211 Call Center Stationed in Charleston (Trident United Way)
United Way Association of South Carolina Position Description Title: SC 2-1-1 Resource Database Specialist United Way Association of South Carolina Department: Reports to: Level/Status: SC211 Call Center
SCHOOL DISTRICT OF MARION COUNTY JOB CLASSIFICATION DESCRIPTION LEVEL/POSITION: COMPUTER NETWORK SPECIALIST 4.78
SCHOOL DISTRICT OF MARION COUNTY JOB CLASSIFICATION DESCRIPTION LEVEL/POSITION: COMPUTER NETWORK SPECIALIST 4.78 AREA(S): DATA CENTER OPERATIONS POSITION SUMMARY: The Network Specialist s role is to install,
NETWORK AND INTEGRATED LIBRARY SYSTEMS ANALYST (Range 125)
NETWORK AND INTEGRATED LIBRARY SYSTEMS ANALYST (Range 125) DEFINITION Performs installation, monitoring, maintenance, operations, optimization, and modification of network hardware, minicomputer and microcomputer
SACRAMENTO CITY UNIFIED SCHOOL DISTRICT Position Description. DEPARTMENT: Technology Services SALARY: Range 13 Salary Schedule A
SACRAMENTO CITY UNIFIED SCHOOL DISTRICT Position Description TITLE: Database Administrator CLASSIFICATION: Non-Represented Management, Classified SERIES: Coordinator III FLSA: Exempt JOB CLASS CODE: 1972
Chief Information Officer
Security manager Job description Job title Security manager Location Wellington Group Organisation Development Business unit / team IT Solutions Grade and salary range Pay Group 1, Pay Band 6 Reports to
This full-time, exempt position reports to the Chief Executive Officer, and is classified in the Finance/Evaluation Administrator level.
CONTROLLER FIRST 5 ALAMEDA COUNTY First 5 Alameda County (F5AC) supports families with young children at home, in child care and in the community. F5AC works to ensure that every child reaches his or her
Terms of Reference for an IT Audit of
National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor
EXECUTIVE DEAN, INSTRUCTIONAL SERVICES
EXECUTIVE DEAN, INSTRUCTIONAL SERVICES Board Approved November 12, 2014 FLSA: EXEMPT DEFINITION Under administrative direction of the Vice President of Instruction, plans, organizes, controls, and provides
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
JOB DESCRIPTION CONTRACTUAL POSITION
Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical
Job Description. Essential Job Functions and Responsibilities
Job Title: Human Resources Clerk Department: Human Resources Reports To: Human Resources Director Salary Grade/Salary Range: 6 ($2258-$3606) Revision : 05/2014 Job Description Position Summary In accordance
6. Responsible for installing, configuring and administering VMware vsphere for test and production environments.
DATE PREPARED: 5/18/2016 TITLE: JOB PURPOSE: NETWORK ENGINEER This position is responsible for the administration and maintenance of the City s IT network infrastructure including network security, data
Certification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
C I T Y O F W E S T L I N N
C I T Y O F W E S T L I N N JOB DESCRIPTION Job Title: DESKTOP TECHNICIAN II GENERAL FUNCTION: Position is responsible for: 1) providing administration and support for all City desktop and peripheral hardware,
Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision.
Application for CRMP Certification (part 1) GRCSI is now offering the Certified Risk Management Professional (CRMP) certification to support and recognize professionals who have skills and experience in
BOYERTOWN AREA SCHOOL DISTRICT Job Description
BOYERTOWN AREA SCHOOL DISTRICT Job Description Position Title: Reports to: SUMMARY: Technology Specialist II Director of Information Technology Under the general supervision of the Director of Information
JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician
COUNTY OF GRANDE PRAIRIE JOB DESCRIPTION JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician NOC CODE: 2281 STANDARD HOURS: 35 hours/week (non-management)
SALEM-KEIZER PUBLIC SCHOOLS JOB DESCRIPTION 7/09 APPLICATION DEVELOPER I 2.14.9. Revised Date Job Title Index
SALEM-KEIZER PUBLIC SCHOOLS JOB DESCRIPTION 7/09 APPLICATION DEVELOPER I 2.14.9 Revised Date Job Title Index PURPOSE To improve student achievement through delivery of custom-developed and purchased applications
Information Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
SENIOR SYSTEMS ANALYST
CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
2. Provide timely response to customer problems; serve as the lead person for troubleshooting escalated server issues and systems issues.
POSITION DESCRIPTION TITLE: Senior Systems Administrator CATEGORY: Professional FLSA STATUS: Exempt GRADE: K (TS) JOB SUMMARY: Manage all server systems activities district wide to include system design,
So Why on Earth Would You WANT To be a CISO?
So Why on Earth Would You WANT To be a CISO? SESSION ID: PROF-M05A Todd Fitzgerald CISSP, CISA, CISM, CRISC, CGEIT, PMP, ISO27000, CIPP, CIPP/US, ITILV3f Global Director of Information Security Grant Thornton
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
SALEM-KEIZER PUBLIC SCHOOLS JOB DESCRIPTION EMERGENCY MANAGEMENT SPECIALIST
SALEM-KEIZER PUBLIC SCHOOLS JOB DESCRIPTION 07/2015 Effective Date EMERGENCY MANAGEMENT SPECIALIST Job Title Index PURPOSE Improve student achievement by performing emergency management duties to ensure
JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech I AD Grid Level 5(h) #68 (Service Desk)
COUNTY OF GRANDE PRAIRIE JOB DESCRIPTION JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech I AD Grid Level 5(h) #68 (Service Desk) NOC CODE: 2171 STANDARD HOURS: 35 hours/week (non-management)
Board Approved March 25, 2015 FLSA: EXEMPT DEAN, DISABLED STUDENT PROGRAMS & SERVICES
Board Approved March 25, 2015 FLSA: EXEMPT DEAN, DISABLED STUDENT PROGRAMS & SERVICES DEFINITION Under administrative direction, plans, organizes, manages, and provides administrative direction and oversight
JOB DESCRIPTION. DATE ISSUED: 07/12 FLSA: Exempt PTO: VCS TITLE. Service Desk Analyst III JOB SUMMARY
DATE ISSUED: 07/12 JOB DESCRIPTION TITLE Service Desk Analyst III JOB SUMMARY The Service Desk Analyst s III role is to ensure proper computer operation so that end users can accomplish business tasks.
Question: 1 Which of the following should be the FIRST step in developing an information security plan?
1 ISACA - CISM Certified Information Security Manager Exam Set: 1, INFORMATION SECURITY GOVERNANCE Question: 1 Which of the following should be the FIRST step in developing an information security plan?
Leads organization s IT disaster recovery and business resumption planning, testing, and implementation pertaining to computing infrastructure.
Network Operation Manager About the Education Achievement Authority: The Education Achievement Authority is a new statewide school system that will assume operation of the lowest five (5) percent of performing
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
DIRECTOR OF HUMAN RESOURCES & EMPLOYER-EMPLOYEE RELATIONS-EEO, DIVERSITY COMPLIANCE & TRAINING,
Page 1 of 6 DIRECTOR OF HUMAN RESOURCES & EMPLOYER-EMPLOYEE RELATIONS-EEO, DIVERSITY COMPLIANCE & TRAINING, JC #676 - Classified Management - Integrated Academic Administrator and Classified Manager Salary
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
INFORMATION SYSTEMS MANAGER
Department: Finance Bargaining Unit: Mid-Management Salary Range: M80 Last Revision: September 2003 INFORMATION SYSTEMS MANAGER DEFINITION Under general direction of the Finance Director, performs responsible
OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:
OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,
SUMMARY OF POSITION ROLE/RESPONSIBILITIES:
SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant
State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO
Policy: Information Security Audit Program Issued by the CTO Policy No: WVOT-PO1008 Issue Date: 08.01.09 Revised: Page 1 of 12 1.0 PURPOSE The West Virginia Office of Technology (WVOT) will maintain an
POSITION DESCRIPTION
POSITION DESCRIPTION TITLE: Systems Administrator CATEGORY: Professional FLSA STATUS: Exempt GRADE: I (TS) ==================================================================================== JOB SUMMARY:
How To Manage Information Security At A University
Data Management & Protection: Roles & Responsibilities Document Version: 1.0 Effective Date: December, 2008 Original Issue Date: December, 2008 Most Recent Revision Date: November 29, 2011 Approval Authority:
SANTA ANA UNIFIED SCHOOL DISTRICT LEAD INTERNAL AUDITOR
SANTA ANA UNIFIED SCHOOL DISTRICT LEAD INTERNAL AUDITOR JOB SUMMARY: This management position will report to the Deputy Superintendent and/or designee. The Internal Auditor will supervise, monitor, review,
PAYROLL AND BENEFITS PROCESSING MANAGER, JC #651, (Classified Management) Integrated Administrator/Manager Salary Range C13, District Services
PAYROLL AND BENEFITS PROCESSING MANAGER, JC #651, (Classified Management) Integrated Administrator/Manager Salary Range C13, District Services DEFINITION To plan, organize, coordinate, manage, control
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
FIRE DEPARTMENT SANTA CLARA COUNTY
FIRE DEPARTMENT SANTA CLARA COUNTY INFORMATION SYSTEMS ANALYST I INFORMATION SYSTEMS ANALYST II INFORMATION SYSTEMS ANALYST III DEFINITION The Information Systems Analyst series generally perform professional
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM
Woodinville Fire and Life Safety District
Woodinville Fire and Life Safety District Class Title: FLSA: Bargaining Unit: Finance Manager Exempt Non-Represented BASIC FUNCTION: Serves as a member of the District management team and as the District
Stellenbosch University. Information Security Regulations
Stellenbosch University Information Security Regulations 1. Preamble 1.1. Information Security is a component of the Risk structure and procedures of the University. 1.2. Stellenbosch University has an
Application for CISA Certification
Application for CISA Certification 4/2015 Requirements to Become a Certified Information Systems Auditor become a Certified Information Systems Auditor (CISA), an applicant must: 1. Score a passing grade
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
INFORMATION TECHNOLOGY TECHNICIAN I/II
INFORMATION TECHNOLOGY TECHNICIAN I/II CITY OF HAYWARD DEFINITION To perform responsible technical duties related to computer hardware and software customer support; provide project support for new and
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
HP Cyber Security Control Cyber Insight & Defence
HP Cyber Security Control Cyber Insight & Defence Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost
SALEM-KEIZER PUBLIC SCHOOLS JOB DESCRIPTION. 05/12 Database Administration 2.14.24. Revised Date Job Title Index
SALEM-KEIZER PUBLIC SCHOOLS JOB DESCRIPTION 05/12 Database Administration 2.14.24 Revised Date Job Title Index PURPOSE Improves student achievement through delivery and administration of data repositories
CITY OF MOSCOW INFORMATION SYSTEMS DEPARTMENT COMPUTER SYSTEMS TECHNICIAN OR COMPUTER SYSTEMS SPECIALIST
CITY OF MOSCOW INFORMATION SYSTEMS DEPARTMENT COMPUTER SYSTEMS TECHNICIAN OR COMPUTER SYSTEMS SPECIALIST The City of Moscow, Information Systems Department is currently seeking an experienced Information
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
