12.07.2015 Views

State of Florida - ISC

State of Florida - ISC

State of Florida - ISC

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How the <strong>State</strong> <strong>of</strong> <strong>Florida</strong> Builds Information SecurityExpertise Despite Escalating Risk and Tight Budgets.CHALLENGETraining and education have always been atop priority for the <strong>State</strong> <strong>of</strong> <strong>Florida</strong>’s Office<strong>of</strong> Information Security (OIS) within theAgency for Enterprise Information Technology(AEIT). The (OIS) was established immediatelyfollowing the events <strong>of</strong> 9/11. Its mission? To helpthe <strong>State</strong>’s executive branch agencies addressWith training as an integral factor in thesuccess <strong>of</strong> each focus area, the OIS laid out anaggressive and detailed training and educationprogram for its information security staff. Infact, its training plan is mapped out in a comprehensivethree-year matrix that illustrateshow the <strong>State</strong> will leverage its workforce tomeet federal, state and private informationcyber security issues and to ensure statewidesecurity standards.Helping state agenciescomply with all requirements such as HIPAA,PCI, and those set forth by the U.S. Department<strong>of</strong> Homeland Security (DHS) is critical tothe Office and AEIT’s success.compliance with Federal and <strong>State</strong> securitystandards. Even though legislation points theefforts <strong>of</strong> the OIS toward the executive branch<strong>of</strong> government, the courts, the <strong>Florida</strong> Legislature,cities, counties and municipalities arewilling participants.With technology evolving at what seems tobe the speed <strong>of</strong> light, how does AEIT keep itsThe Office’s five focus areas related to enterpriseinformation security are:information technology staff up-to-date onbest security practices?• Policy• Training• Risk management• Incident responseAnd in light <strong>of</strong> budget cuts, how does AEITmaintain its expertise in protecting critical,proprietary information?• Survivability1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!