Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The training requirements set the minimum threshold for appropriate training - you and your line management are responsible for identifying additional training you need to do your work in a secure manner.

Required Training

The Computer Protection Program Cyber Security Operations and IT Policy reviews, as necessary, but at least annually, the content of required training courses. The JHA training system implements the applicability for each training and provides management reporting and individual tracking.

...