Management How-To Guide

Slides:



Advertisements
Similar presentations
EvalS Application User Guide version September 17, 2011.
Advertisements

A student instruction guide to using. Why PASS-PORT? Speed User Friendly Cost Effective.
Information Services Portal Login/Logout. LOGIN PAGE Please refer to the following pages for scenarios 1, 2 and 3 Please refer to the ‘Guest User’ User.
The Federal Hiring Process Using USAJOBS & Application Manager
City of Chicago Cyber Grants Instruction Manual
Application Process USAJOBS – Application Manager USA STAFFING ® —OPM’S AUTOMATED HIRING TOOL FOR FEDERAL AGENCIES.
Student Guide to DIGGERecruiting.
Quick Reference Guide Welcome TEST USER Version_NSU_ HELP RETIREMENT MANAGER DEMO FEEDBACK.
LGC Website and Customer On-line Tools LGC RESOURCE 2014.
Search Empower Engage Send Print Co-Brand With BusinessBuilder.
Benefits Self Service This presentation walks you through enrolling into benefits using Benefits Self Service.
Career Services Center Employer Training. This is the main login page. The link can be found at Employers.
Lead Management Tool Partner User Guide March 15, 2013
Last updated on May 20, How to Register with the HireAnIslander Database.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Confidential Web Ordering Overview. Confidential LOG ON:   Enter your login name &
Public Purchase Vendor Registration & Responding to a Bid Copyright © The Public Group, LLC - This document is confidential and intended only for the use.
3M Partners and Suppliers Click to edit Master title style USER GUIDE Supplier eInvoicing USER GUIDE The 3M beX environment: Day-to-day use.
ELISTING How to use eListing to conveniently and quickly file your personal property listing online. DEPARTMENT OF ASSESSMENTS King County To navigate.
Reporter Training for High School RIO TM
Find a Lawyer Launch Guide How to make the most of this powerful new member benefit.
How to Use the Online Project Monitoring System (OPMS) Navigating the Survey.
Welcome to the Testing Information Management System (TIMS)
Job site An Inside Look…
Welcome to BLT Online NQT Induction.
Schoology at GRMS Schoology is a new communication platform for teachers, students, and parents. We hope this will assist in creating a culture at GRMS.
How to complete the profile and make an application.
YOU MUST READ THIS PAGE BEFORE YOU BEGIN!!!
Submitting a New IRB Protocol
Schoology at FCMS Schoology is a new communication platform for teachers, students, and parents. We hope this will assist in creating a culture at GRMS.
Supplier Sourcing Guide
Supplier Registration
USAJOBS – Application Manager
SUBMITTING A PAYMENT REQUEST FORM
ERO Portal Overview & CFR Tool Training
New Mexico Emergency Operations Center (NMEOC) Basic ETeam Training
Scholarship America Dollars for Scholars: Completing the Student Profile All Dollars for Scholars scholarships are applied for online via the Dollars.
Deliberate Practice PGP
Completing the Parent Portion of the Student Profile
Wethersfield Dollars for Scholars For additional help contact us at:
IVG Driver Training Driver Workflow.
Completing the Parent Portion of the Student Profile
Battelle Supplier Onboarding
Scholarship America Dollars for Scholars: Completing the Student Profile All Dollars for Scholars scholarships are applied for online via the Dollars.
The Smarter Balanced Assessment Consortium
The Smarter Balanced Assessment Consortium
Completing the Parent Portion of the Student Profile
CTAERN/DOE System Level Counselor Coordinator Profile Entry Initiative
Applying for a contractor’s license online
Scholarship Application Tutorial
Use of a Peer Notetaker Accommodation
What’s New in Time & Attendance
CTAERN/DOE System Level Counselor Coordinator Profile Entry Initiative
Cayuse IRB - Initial Training
The Smarter Balanced Assessment Consortium
The Smarter Balanced Assessment Consortium
Home Tab – Task List Now please remember that in order to utilize this functionality trade users will need “Full Access” to “Forms” and the mode of communication.
GRANT APPLICATION INSTRUCTIONS
Employee Cybersecurity Program
Employee Cybersecurity Program
Scholarship America Dollars for Scholars: Completing the Student Profile All Dollars for Scholars scholarships are applied for online via the Dollars.
Volunteer Notetakers A complete guide on how to to sign-up as a Notetaker with the MU Disability Center.
Cayuse IRB - Initial Training
Employee Cybersecurity Program
Completing the Primary Reference portion of the Student Profile
Schoology at GRMS Schoology is a new communication platform for teachers, students, and parents. We hope this will assist in creating a culture at GRMS.
Scholarship America Dollars for Scholars: Completing the Student Profile All Dollars for Scholars scholarships are applied for online via the Dollars.
Scholarship America Dollars for Scholars: Completing the Student Profile All Dollars for Scholars scholarships are applied for online via the Dollars.
Presentation transcript:

Management How-To Guide Security Risk Assessment Go through document and complete all [red] text place holders Remove the red for all text except for pertinent dates or information Go to View  Slide Master Edit the 3 slide master templates with your logo and contact information. Ensure these all stay in the same location on each template to keep consistent throughout the guide. Save as pdf and send to client management to distribute along with your custom email template! Management How-To Guide

Information to perform the Security Risk Assessment (SRA) The SRA is designed to get a comprehensive report of your overall level of risk and provide recommendations intended to lower those levels of risk. Before you begin your risk assessment, here are a few Frequently Asked Questions you’ll want to look at: Q: If I’m not 100% sure of my answer, does it matter? A: The goal of a Security Risk Assessment is to analyze your organization for any security gaps or weaknesses that cybercriminals could exploit to access your network. It is in your best interest to be as thorough and accurate in your Risk Assessment responses as possible. Q: I really don’t know how to answer this question. What if my information is inaccurate? A: Accurate information will enable our team to produce the most appropriate findings and recommendations on your Risk Assessment report. This will also allow for your organization to assess how we can better protect you and your business. Providing incorrect information will result in an inaccurate Risk Assessment which can lead to lost time and money on unnecessary recommendations. In addition, in the event of an audit situation, any information which cannot be fully supported in your Risk Assessment may result in additional penalties. Please contact us if you need any assistance with providing information or answering questions. Q: Do you share my answers with any other party? A: No, the information you provide in our portal is confidential and will not be shared with any other party.

Steps to Performing your Security Risk Assessment (SRA) Step 1: Using your Manager account credentials, log into the PII-Protect portal here. Note: Individuals registered as Employees will be unable to access the Security Risk Assessment and should be upgraded to Manager access. Step 2: Once you log into the portal, scroll down to the Quick Links. Under the SRA category click, Perform Security Risk Assessment.

Steps to Performing your Security Risk Assessment (SRA) Step 3: Once you’ve selected “Perform Security Risk Assessment”, it’s time to fill out the Organization Profile. Do this by selecting the blue arrow in Step 1. - Completing the Organization Profile is a way for you to give us information about your company, such as which systems contain Personally Identifiable Information (PII). - Once you have filled in all the necessary information in each tab, (Note: there are a total of 8 sections [tabs] that must be completed) click save. Note: You can click save at any time to save the information you have entered and continue filling out the Organization Profile at a later time.

Steps to Performing your Security Risk Assessment (SRA) Step 4: Once you have completed the Organization Profile, the next step is to answer the Security Risk Assessment questions. To begin, click on the blue arrow in Step 2. Note: If you are no longer in the Security Risk Assessment section of the portal, you will need to return to this section to begin the questionnaire.

Steps to Performing your Security Risk Assessment (SRA) Step 5: The Risk Assessment questionnaire asks specific questions on how you are currently protecting Personally Identifiable Information (PII). Each question has a detailed explanation to help you choose the appropriate answer. - There are several sections (tabs) of questions in the questionnaire. After answering the group of questions in each tab, click Save and next to move on to the next tab/set of questions. - A completed section will be labeled with a green checkmark and incomplete sections will have a red X to illustrate that some questions have not yet been answered. - Once you have gone through each section/all of the questions and ensured that a green checkmark appears on each tab, click Submit. Note: Similar to the Organization Profile, you can save your answers and pick back up where you left off at a later time. !! Important: All information must be filled out in the Organization Profile and all questions must be answered in order for us to complete your Risk Assessment. Please ensure that all required sections have been completed before marking your Risk Assessment complete.

Steps to Performing your Security Risk Assessment (SRA) Step 6: The next step in the Risk Assessment process is to upload any existing written Policies and Procedures that your organization may have. This can be done by clicking on the blue arrow in Step 3 Note: If you are no longer in the Security Risk Assessment section of the portal, you will need to return to this section to upload your Policies and Procedures. - Note: if you do not have any existing Policies regarding how your organization protects PII (I.e. employee termination policy, data backup policy, disaster recovery procedure, etc.), this section can be skipped. - To upload an existing Policy, perform the following steps (after you’ve clicked on the blue arrow in Step 3): At the top of the screen under Actions, click on New Other Policies and Procedures. Enter the Name of the Policy Enter a Description of the Policy Enter Policy Details (optional additional information) Click on Choose File and select the file with the existing policy (could be a Microsoft Word document or a PDF) Click Save Repeat the above steps if you have additional policies or procedures to upload

Steps to Performing your Security Risk Assessment (SRA) Step 7: The final step in the process is to let us know that you have finished entering all the information in each of the required sections by marking your Risk Assessment complete. - From the Perform Risk Assessment section of the portal, select the blue arrow in Step 4. - A pop-up will appear confirming that you wish to mark your Risk Assessment complete. - Click Mark Complete. After you have marked the Risk Assessment complete, we will receive notification that you have completed your portion of the Risk Assessment. We will then begin producing your Risk Assessment report and will notify you once it has been completed. If you have any questions, feel free to use the Contact Us link on the bottom of the portal home page under the Feedback Quick Link.