Federal rules now require institutions to manage their data so it can be produced quickly and completely if demanded by district court cases.
In this session Deputy CISO David Matthews will use his first-hand experience to provide your organization up to date information and documents on:
Compliance with Federal...
The number of fraudulent IRS websites taken down in 2008 soared to 3,030, up more than 240 percent from 2007, according to a GAO analysis, suggesting a sharp increase by criminals to draw unassuming taxpayers to faux tax agency websites to steal identities and money.
The Department of Homeland Security public-facing website do a pretty good job safeguarding DHS data, but needs to do more to truly secure these sites, according to a just-released audit by the DHS Inspector General.
Money-laundering is one of the most common and complex financial crimes to be committed. Learn exactly what you need to know about the specific statutes and regulations that govern the crime.
Register for this webinar to receive first-hand advice from a veteran anti-money laundering investigator on:
Key...
The Social Security Administration has failed to comply with three of five recommendations made by auditors in 2001 to tighten IT security standards, the agency's inspector general said in a new report.
Several military units failed to adequately sanitize hard drives of data, including Social Security numbers of military personnel, before shipping the IT equipment to other organizations, in violation of Department of Defense rules, the DoD inspector general said in a report.
The Department of Homeland Security maintains an effective, enterprise-wide information security management program for its intelligence systems, according to an unclassified summary of an audit conducted by the DHS inspector general.
Homeland Security's inspector general contends that DHS's Control Systems Security Program can become more effective in helping secure the nation's critical IT infrastructure.
Most organizations spend 30-50% more on compliance than they should 1. No matter the industry, with regulations such as GLBA, PCI, FISMA, SOX, and other regulations and mandates, it seems nobody is immune to scrutiny - but why spend so much more than what is necessary? In order to reduce the burden of an IT audit,...
To assure top grades in IT security audits, the National Science Foundation conducts penetration and vulnerability tests before the inspector general conducts its own inspection.
State Department matches its reported security incidents against 20 most critical cybersecurity controls, and employs that knowledge to proactively defend its IT systems and networks.
The guide provides a flexible, risk-based framework for data reliability assessments that can be geared to the specific circumstances of each engagement
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.