16
Security Campaign (Ongoing) Risk Assessment (Complete) Risk Assessment Action Plan (In Progress) DHS (NCATS) Hygiene Scanning - Vulnerability Scanning (In Progress) Penetration Testing (2019)

Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Security Campaign (Ongoing)

Risk Assessment (Complete)

Risk Assessment Action Plan (In Progress)

DHS (NCATS) Hygiene Scanning - Vulnerability Scanning (In Progress)

Penetration Testing (2019)

Page 2: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Security CampaignMandatory Digital Citizenship and Safety Course

Page 3: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Security CampaignIntranet Staff/Student Webpage Daily Staff Tips

Page 4: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Security CampaignPosters

Page 5: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Security CampaignEmail Alerts

Page 6: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Risk AssessmentVendor CCSI - Scope of Work

Page 7: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Risk AssessmentVendor CCSI - Report

Page 8: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Risk AssessmentVendor CCSI - Report

Page 9: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Risk AssessmentVendor CCSI - Report

Page 10: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Risk AssessmentVendor CCSI - Report

Control Number: Name

● Image of System● Finding● Security/Risk Impact (Control Rating)● Affected Assets● Recommendation

Page 11: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Risk AssessmentVendor CCSI - Report

Page 12: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Risk AssessmentVendor CCSI - Report

Page 13: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Risk AssessmentVendor CCSI - Report

Page 14: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Risk AssessmentMSD - Action Plan

Page 15: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

DHS - Cyber Hygiene -Vulnerability ScanningScope and Agreement

Page 16: Security Campaign (Ongoing) Risk Assessment (Complete ... · Audit of secure configurations of hardware/software Determination of vulnerability assessment within the school Controlled

Penetration TestingScope of Work