My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2025-05-27-minutes-it-study-session
>
Meetings
>
2025
>
10. October
>
2025-10-07 10:00 AM - Commissioners' Agenda
>
2025-05-27-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/2/2025 3:46:32 PM
Creation date
10/2/2025 3:44:53 PM
Metadata
Fields
Template:
Meeting
Date
10/7/2025
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
136417
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
90
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />9/25 <br />PRIVATE - Controlled by Lumifi Cyber <br />• Identification of the organizational structure and essential stakeholders in security <br />management activities <br />• The information risk environment <br />• Governance, policy management, acceptable risk tolerance <br />• Information security planning activities <br />• Additional functional components of the security program and the key practices <br />supporting the security program components <br />• Operational risk and compliance activities <br />• Critical issues confronting Kittitas County <br />• Prior information security-related assessments <br />• The general technical architecture <br />• Security training needs for staff <br />• Encryption – especially on mobile devices <br />• Limitations on information being passed (especially sensitive or regulated data) <br />• Strengthen passwords with apps, VoIP, voicemail PINs <br />• Incident response <br />• Specific SSL/TLS vulnerabilities <br />• Use of AI <br />As stated, Lumifi Cyber will derive most of the information necessary to assess the <br />environment and supporting key practices through documentation reviews, such as policies, <br />procedures, and plans related to information security, and interviews and subseque nt <br />discussions with knowledgeable staff responsible for various aspects of information <br />security management including: <br />• Executive Management <br />• Key business unit leaders <br />• Information Security staff <br />• CIO, IT Management, Administrators <br />• Developers <br />• Staff focused on Business Continuity and Disaster Recovery
The URL can be used to link to this page
Your browser does not support the video tag.