Technology
Responsibilities of the Information Security Officer-Fa25
This presentation is for those who are new to the ISO (or similar) role or have been the ISO for some time but want to review what is expected and how to be successful.
Using Your BIA and Data Flow Diagrams to Understand Risk-Fa25
This program will look at building a valuable DFD, and you’ll find an answer to the question “where does my data go when it leaves my network, and how is that data being protected?”


