by Brian Leakey | Jul 27, 2023 | Security
What is a Safety Management System (SMS)?How have SMS evolved over time?
by Brian Leakey | Jul 27, 2023 | Security
List and describe the six tasks to be followed when developing and implementing an effective security policy in order for a policy to be legally defensible.
by Brian Leakey | Jul 4, 2023 | Security
Discuss your experience and knowledge in building a detailed understanding of cyber data, data flows, and processes within an organization? How have you utilized this knowledge to support analytics initiatives or address cyber-related challenges?
by Brian Leakey | Jul 4, 2023 | Security
Can you discuss your knowledge of Security Operations Centers (SOC) and your hands-on experience with SIEM and SOAR platforms? How have you utilized these platforms to identify and respond to cybersecurity threats?
by Brian Leakey | Jun 25, 2023 | Security
For each policy (Social Security Act, Economic Opportunity Act, Personal Responsibility and Work Opportunity Reconciliation Act), briefly: Explain how the policy is addressed at the federal, state, and local level.What programs were developed from this policy?Reflect...
by Brian Leakey | Jun 25, 2023 | Security
For each policy (Social Security Act, Economic Opportunity Act, Personal Responsibility and Work Opportunity Reconciliation Act), briefly: Explain how the policy is addressed at the federal, state, and local level.What programs were developed from this policy?Reflect...