An arc flash risk assessment project is broken down into the following project phases: Phase 1 ― data collection. Phase 2 ― engineering analysis, which includes at a minimum the arc flash incident ...
Cyber threats are an everyday reality. Attackers exploit the unwitting, stealing confidential and sensitive information through online scam campaigns. Data breach prevention is only as strong as the ...
Whether businesses are grappling with rapidly changing market conditions, continued pandemic disruptions, geopolitical conflicts or shifting workplace arrangements, threat actors are looking to take ...
Debbie Christofferson has worked in IT and information security for many years, in many different types of public and private sector organizations. Today she is a board director of the Information ...
There’s no getting around it, I am long in the tooth and have been dealing with individuals who break trust within their work environment for more than 30 years, both in government (where we called it ...
This certificate program is composed of 15 credit hours, which you can complete on a part-time basis over three to four lightly scheduled semesters. And, any credits you earn as a part of your program ...
The authors of the new Cyber Risk Management Program framework explain how it can set an organization up to better comply with SEC and other disclosure and reporting regulations. In a landmark ...