Cyber Security Program

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1836 Experts worldwide ranked by ideXlab platform

Office Of The Inspector General - One of the best experts on this subject based on the ideXlab platform.

  • Semi-Annual Report to Congress for the Period of October 1, 2014 to March 31, 2015
    DigitalCommons@ILR, 2015
    Co-Authors: Office Of The Inspector General
    Abstract:

    [Excerpt] I am pleased to submit this issue of the Semiannual Report to the Department and the Congress. Pursuant to the Inspector General Act of 1978, as amended, this report presents the most significant activities and accomplishments of the U.S. Department of Labor (DOL) Office of Inspector General (OIG) for the six-month period ending March 31, 2015. The OIG remains committed to promoting the integrity, effectiveness, and efficiency of DOL’s Programs and operations. During this reporting period, the OIG issued 22 audit and other reports that, among other things, recommended that more than $112 million in funds be put to better use, and questioned $5.6 million in costs. Among our many significant findings, we reported the following: The Wage and Hour Division did not distribute $60 million of back wages owed to employees after making minimal efforts to locate them. DOL’s Cyber Security Program presented unnecessary risks to the confidentiality, integrity, and availability of DOL’s information. Improper payment detection and recovery rates in Pennsylvania’s Unemployment Insurance (UI) Program remained well short of the target of 50 percent during the period 2009 to 2013, and estimated improper UI payments totaling $1.7 billion went undetected while $500 million of detected overpayments were not recovered. Job Corps had exposed students and staff to potentially dangerous students because its center operators had not enforced disciplinary policies. The Employment and Training Administration expended $7.8 million in Superstorm Sandy National Emergency Grant funds that were used for potentially ineligible participants. OIG investigations also continue to combat Program fraud, labor racketeering, and organized crime in internal union affairs, employee benefit plans, and labor-management relations. During this reporting period the OIG’s investigative work yielded impressive results, with a total of 209 indictments, 203 convictions, and $27.8 million in monetary accomplishments. Highlights of our work include the following: An Illinois CEO and a head trader were sentenced to prison and ordered to pay restitution of $665 million for a massive fraud scheme involving Employee Retirement Income Security Act - covered pension funds. Miami siblings were sentenced to prison and ordered to pay $815,000 in restitution for their roles in an identity theft and Unemployment Insurance (UI) fraud scheme. A Cleveland woman was sentenced to prison and ordered to pay $360,000 in restitution for her role in a multi state unemployment insurance fraud scheme. Three former presidents and a former vice president of the International Longshoremen’s Association Local 1235 were sentenced to prison for conspiring to compel tribute payments from union members by threatening them with violence. These are some of the examples of the exceptional work done by our dedicated OIG staff. I would like to express my gratitude to them for their significant achievements during this reporting period. We are currently working on several important audits. For more details, I invite you to review our updated audit work plan, which can be found in the appendix of this report. I look forward to continuing to work constructively with the Department and the Congress on our shared goals of identifying improvements to DOL Programs and operations, and protecting the interests and benefits of workers and retirees

  • Semi-Annual Report to Congress for the Period of October 1, 2014 to March 31, 2015
    2015
    Co-Authors: Office Of The Inspector General
    Abstract:

    [Excerpt] I am pleased to submit this issue of the Semiannual Report to the Department and the Congress. Pursuant to the Inspector General Act of 1978, as amended, this report presents the most significant activities and accomplishments of the U.S. Department of Labor (DOL) Office of Inspector General (OIG) for the six-month period ending March 31, 2015. The OIG remains committed to promoting the integrity, effectiveness, and efficiency of DOL’s Programs and operations. During this reporting period, the OIG issued 22 audit and other reports that, among other things, recommended that more than $112 million in funds be put to better use, and questioned $5.6 million in costs. Among our many significant findings, we reported the following: The Wage and Hour Division did not distribute $60 million of back wages owed to employees after making minimal efforts to locate them. DOL’s Cyber Security Program presented unnecessary risks to the confidentiality, integrity, and availability of DOL’s information. Improper payment detection and recovery rates in Pennsylvania’s Unemployment Insurance (UI) Program remained well short of the target of 50 percent during the period 2009 to 2013, and estimated improper UI payments totaling $1.7 billion went undetected while $500 million of detected overpayments were not recovered. Job Corps had exposed students and staff to potentially dangerous students because its center operators had not enforced disciplinary policies. The Employment and Training Administration expended $7.8 million in Superstorm Sandy National Emergency Grant funds that were used for potentially ineligible participants. OIG investigations also continue to combat Program fraud, labor racketeering, and organized crime in internal union affairs, employee benefit plans, and labor-management relations. During this reporting period the OIG’s investigative work yielded impressive results, with a total of 209 indictments, 203 convictions, and $27.8 million in monetary accomplishments. Highlights of our work include the following: An Illinois CEO and a head trader were sentenced to prison and ordered to pay restitution of $665 million for a massive fraud scheme involving Employee Retirement Income Security Act - covered pension funds. Miami siblings were sentenced to prison and ordered to pay $815,000 in restitution for their roles in an identity theft and Unemployment Insurance (UI) fraud scheme. A Cleveland woman was sentenced to prison and ordered to pay $360,000 in restitution for her role in a multi state unemployment insurance fraud scheme. Three former presidents and a former vice president of the International Longshoremen’s Association Local 1235 were sentenced to prison for conspiring to compel tribute payments from union members by threatening them with violence. These are some of the examples of the exceptional work done by our dedicated OIG staff. I would like to express my gratitude to them for their significant achievements during this reporting period. We are currently working on several important audits. For more details, I invite you to review our updated audit work plan, which can be found in the appendix of this report. I look forward to continuing to work constructively with the Department and the Congress on our shared goals of identifying improvements to DOL Programs and operations, and protecting the interests and benefits of workers and retirees.OIG_Semiannual_Report_to_Congress_v73.pdf: 17 downloads, before Oct. 1, 2020

Gerald L Kovacich - One of the best experts on this subject based on the ideXlab platform.

  • the Cyber Security Program s strategic tactical and annual plans
    The Information Systems Security Officer's Guide (Third Edition)#R##N#Establishing and Managing a Cyber Security Program, 2016
    Co-Authors: Gerald L Kovacich
    Abstract:

    The objective of this chapter is to establish the strategic, tactical, and annual plans for the Cyber Security organization. These plans will also set the direction for corporate’s Cyber Security Program while integrating the Cyber Security plans into corporate’s plans, thus indicating that the Cyber Security Program is an integral part of the corporation.

  • establishing a Cyber Security Program and organization
    The Information Systems Security Officer's Guide (Third Edition)#R##N#Establishing and Managing a Cyber Security Program, 2016
    Co-Authors: Gerald L Kovacich
    Abstract:

    The objective of this chapter is to describe how to establish a corporate Cyber Security Program and its associated organization. A “what-if” approach is used in which a corporate Security officer is shown to act in a certain way based on what is required of him or her by corporation in which that person is employed, using a fictional corporate environment.

Youngki Kim - One of the best experts on this subject based on the ideXlab platform.

  • A graded approach to Cyber Security in a research reactor facility
    Progress in Nuclear Energy, 2013
    Co-Authors: Jaekwan Park, Jeyun Park, Youngki Kim
    Abstract:

    Abstract Recently, several accidents caused by Cyber attacks on digital systems have been reported in the nuclear industry. To cope with such threats, regulatory agency and standardization organization have published several guidelines for nuclear power plants. However it is difficult to apply the requirements to research reactor facilities directly because the characteristics in terms of facility scale, purpose, and system design, are different from those of power plants. This paper suggests a graded approach to Cyber Security in a research reactor facility. It introduces Cyber Security activities for guarding digital systems of a reactor facility safely as a Cyber Security Program based on the practices at a research reactor facility.

Jaekwan Park - One of the best experts on this subject based on the ideXlab platform.

  • A graded approach to Cyber Security in a research reactor facility
    Progress in Nuclear Energy, 2013
    Co-Authors: Jaekwan Park, Jeyun Park, Youngki Kim
    Abstract:

    Abstract Recently, several accidents caused by Cyber attacks on digital systems have been reported in the nuclear industry. To cope with such threats, regulatory agency and standardization organization have published several guidelines for nuclear power plants. However it is difficult to apply the requirements to research reactor facilities directly because the characteristics in terms of facility scale, purpose, and system design, are different from those of power plants. This paper suggests a graded approach to Cyber Security in a research reactor facility. It introduces Cyber Security activities for guarding digital systems of a reactor facility safely as a Cyber Security Program based on the practices at a research reactor facility.

Jeyun Park - One of the best experts on this subject based on the ideXlab platform.

  • A graded approach to Cyber Security in a research reactor facility
    Progress in Nuclear Energy, 2013
    Co-Authors: Jaekwan Park, Jeyun Park, Youngki Kim
    Abstract:

    Abstract Recently, several accidents caused by Cyber attacks on digital systems have been reported in the nuclear industry. To cope with such threats, regulatory agency and standardization organization have published several guidelines for nuclear power plants. However it is difficult to apply the requirements to research reactor facilities directly because the characteristics in terms of facility scale, purpose, and system design, are different from those of power plants. This paper suggests a graded approach to Cyber Security in a research reactor facility. It introduces Cyber Security activities for guarding digital systems of a reactor facility safely as a Cyber Security Program based on the practices at a research reactor facility.