Information to Jump-Start Your Organization's
Security and Risk Management Program
IT Security Risk Management (ITSRM)
IMPLEMENTATION:  The security officer, webmaster, or other designated subject matter expert (SME) will copy the contents of the Flash Drive (HTML web pages) to a secure workstation and tailor selected web pages to meet your organization's unique requirements; after which, the updated HTML document(s) are published/copied to a designated server or private cloud-based computing environment for access by authorized staff and end-users.  Note:  A website publishing tool, such as WordPress, Drupal, Joomla!, Dreamweaver, FrontPage, Expressions Web, etc. may be required.