Home > Top Management Challenges > Review of IT Security Policies, Procedures, Practices, and Capabilities in Accordance with the Cybersecurity Act of 2015
Review of IT Security Policies, Procedures, Practices, and Capabilities in Accordance with the Cybersecurity Act of 2015
Date Issued | August 4, 2016 |
---|---|
Report Number | OIG-16-040-A |
Report Type | Audits / Evaluations |
Description |
Pursuant to the requirements in the Cybersecurity Act of 2015, Pub. L. No. I 14-1 13, Division N, § 406 (2015), we are initiating an audit of the Department's IT security policies and practices for national security systems and systems that provide access to personally identifiable information (PII). |
View Announcement | Announcement-of-Cybersecurity-Act-of-2015-Department-Wide-Security-Metrics-Assessment.pdf |
View Abstract | 2016-08-04_Cybersecurity_Act_RIB_SECURED.pdf |
View Report | OIG-16-040-A.pdf |