Showing 1 ideas for tag "policy"

2. Business Initiated Vulnerabilities

Supported ITAPS recommendations

Community Member kudos icon + Community member
(Paragraphs preceded by [Non-ITAPS] are expanded recommendations to more explicitly address questions, not directly addressed by ITAPS; participated in and collaborated with ITAPS OMB-OPM-NSC Task Force)

How can agencies sharpen focus on vulnerabilities created by (or exposed by) uninformed business/program users and the array of technology solutions embedded in service delivery that does not account for cyber?

[Non-ITAPS]... more »


1 vote
Public Input