My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2025-05-27-minutes-it-study-session
>
Meetings
>
2025
>
10. October
>
2025-10-07 10:00 AM - Commissioners' Agenda
>
2025-05-27-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/2/2025 3:46:32 PM
Creation date
10/2/2025 3:44:53 PM
Metadata
Fields
Template:
Meeting
Date
10/7/2025
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
136417
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
90
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />21/25 <br />PRIVATE - Controlled by Lumifi Cyber <br />• Do you require secure baseline configurations for all IT systems and do you <br />regular monitor those configurations? <br />• Do you use Network Access Control technologies? <br />• Is your firewall in a Default Deny configuration? <br />• Are all rules documented with a business function? <br />• Are the firewalls and any network ACLs reviewed regularly? <br />• Describe the Monitoring, Alerting and Incident Response systems and <br />processes <br />• Describe the Vulnerability Management systems and processes <br />• Describe the process of gathering security requirements for new or updated <br />technology and infrastructure <br />• Describe the Security Testing systems and processes in use and how the <br />findings are incorporated into the environment and processes <br />• Do you conduct audits on the network and on system to find regulated or <br />classified data and assess if it is being handled correctly? <br />• Do you use any data monitoring technologies or is DLP incorporated into the <br />regulated or classified data protection measures? <br />• How are resets performed and how are identities verified prior to issuance <br />of a new password? <br />• HR Interview Session: Staff who are knowledgeable about hiring, termination, job <br />role change, and training practices, approximately ½ hour. <br />• Hiring process, termination process, training requirements policy <br />enforcement <br />• Do you conduct Background Checks prior to hiring and for what positions? <br />• Describe standard and hostile terminations or job position shifts? <br />• Do you assist in enforcement of Policy violations? Do you use a progressive <br />discipline system? <br />• How does HR notify other departments and the facilities managers of an <br />upcoming separation? Are there forms used to track the collection of assets <br />and the removal of both physical and logical access? <br />• Procurement Interview Session: Purchasing, Contracts, approximately ½ hour. <br />• Describe security in the procurement process - Are security risks weighed <br />as a part of the procurement process?
The URL can be used to link to this page
Your browser does not support the video tag.