Laserfiche WebLink
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />9/25 <br />PRIVATE - Controlled by Lumifi Cyber <br />• Identification of the organizational structure and essential stakeholders in security <br />management activities <br />• The information risk environment <br />• Governance, policy management, acceptable risk tolerance <br />• Information security planning activities <br />• Additional functional components of the security program and the key practices <br />supporting the security program components <br />• Operational risk and compliance activities <br />• Critical issues confronting Kittitas County <br />• Prior information security-related assessments <br />• The general technical architecture <br />• Security training needs for staff <br />• Encryption – especially on mobile devices <br />• Limitations on information being passed (especially sensitive or regulated data) <br />• Strengthen passwords with apps, VoIP, voicemail PINs <br />• Incident response <br />• Specific SSL/TLS vulnerabilities <br />• Use of AI <br />As stated, Lumifi Cyber will derive most of the information necessary to assess the <br />environment and supporting key practices through documentation reviews, such as policies, <br />procedures, and plans related to information security, and interviews and subseque nt <br />discussions with knowledgeable staff responsible for various aspects of information <br />security management including: <br />• Executive Management <br />• Key business unit leaders <br />• Information Security staff <br />• CIO, IT Management, Administrators <br />• Developers <br />• Staff focused on Business Continuity and Disaster Recovery