Data Hubs: Does the original data collector/creator/principal investigator retain the right to use the data before opening it up to wider use?

Normally, the data are referred to as point-based, although line (transect data from environmental surveys, collections e.g, data needs to move automatically to various workflow resources, based on policies, so data is always available at the right place, at the right time, and at the right cost while keeping an Read more…

Cyber Security Regulation: How will critical mission objectives be impacted if the data or processes required to execute the mission objectives are altered due to Cyber-attack and/or exploitation?

The cyber-security market is characterized by rapidly changing customer requirements driven by legal, regulatory, and self-regulatory compliance mandates, frequent new product introductions and enhancements, and evolving industry standards in computer hardware and software technology. Defensive cyber operations functions include reviewing or modifying defensive cyber operations and cyber security program plans Read more…

Cyber Security Risk Management: Does the accountable officer have sufficient independence from IT to provide oversight reporting on overall matters of technology and cyber risk?

Organizations are considering enhanced cyber risk management standards for covered entities to increase the entities operational resilience and reduce the potential impact on the financial system as a result of, for example, a cyber-attack at a firm or the failure to implement appropriate cyber risk management. Cyber security and IT Read more…