Cybersecurity Controls Assessment

July 22, 2019

DAS is the state’s central administrative agency. It supports state agencies by providing management frameworks and infrastructure for information systems and services, procurement, and other functions. Responsibility for cybersecurity is split between DAS, the Office of the State CIO, and the Enterprise Security Office. This audit assessed critical security controls and the information technology (IT) security management practices at the Department of Administrative Services (DAS). We concluded the agency does not have a security management program that identifies necessary actions to ensure systems are appropriately secure, and lacks basic foundational IT controls for all six cybersecurity controls we reviewed. As a result, DAS systems and data may be at risk for unauthorized use, disclosure, or modification.

Spotlight

Premises Systems

Premises Systems is a premier network infrastructure engineering and maintenance service provider that is changing the way small businesses and corporations operate. Experience the cost savings and convenience of integrating your network with the comfort of relying on one of the most experienced and reliable companies in the industry.

OTHER WHITEPAPERS
news image

Cisco Spaces – Privacy and Data Protection

whitePaper | December 2, 2022

Cisco Spaces is an indoor location services cloud platform that provides wireless customers with rich locationbased services, including location analytics, business insight, customer experience management, asset tracking, Bluetooth Low Energy (BLE) management, and API.

Read More
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More
news image

Analyzing the Economic and Operational Benefits of theDell Data Protection Portfolio

whitePaper | November 29, 2022

We live in an intensely data-driven world, where data loss is unacceptable and quick access to information with real-time analytics driven by machine learning and artificial intelligence is at the core of decision making. Effective data protection is a critical component of every successful business. Now, more than ever, organizations are looking at their data protection strategies through a new lens. They are evaluating old practices, with a focus on making data protection a hands-off, efficient solution they can rely on without applying extensive IT resources. This can be accomplished through standardizing on a vendor with a comprehensive data protection offering, single management capabilities, and support across a diverse network of systems on-premises, in public and private data centers, in multiple clouds, and in remote office/branch offices (ROBO) and edge environments.

Read More
news image

XDR vs. SIEM: A Cybersecurity Leader’s Guide

whitePaper | December 27, 2022

As threats intensify and SecOps teams are called upon to defend digital environments that keep growing in size and complexity, and with a defensible perimeter that has all but disappeared, cybersecurity vendors are responding with a new generation of software and service solutions.

Read More
news image

IoT Application Provisioning for Security Using FDO and TPM

whitePaper | December 29, 2022

The Internet of Things (IoT) offers the appealing possibility of harnessing millions of devices that measure or modify real world things and allows processes to be optimized. There are many opportunities: thermostats optimized for tomorrow’s weather, shipping containers optimized for packing before their contents arrive, assembly lines that reconfigure automatically for each item, street lighting adjusted to make streets safer, and so on.

Read More
news image

Cloud Collaboration Security Technical Paper Series: Webex Messaging

whitePaper | December 17, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. This paper describes the architecture and security features related to the Webex Messaging service and the suite of tools that the Webex Messaging service provides to keep customers’ data safe from Cisco as well as external attackers.

Read More

Spotlight

Premises Systems

Premises Systems is a premier network infrastructure engineering and maintenance service provider that is changing the way small businesses and corporations operate. Experience the cost savings and convenience of integrating your network with the comfort of relying on one of the most experienced and reliable companies in the industry.

Events