Open Recommendations
| Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
|---|---|---|---|---|---|
| 1 | No | $0 | $0 | ||
| Develop and maintain cybersecurity profile(s) that define key elements of the Board’s current and target cybersecurity program in alignment with the Board’s organizational risk tolerance, mission objectives, and threat environment. | |||||
| 2 | No | $0 | $0 | ||
| Evaluate the dual-use model for the Board’s mobile devices, in accordance with the Board’s security objectives and risk tolerance, and review and update the Information Technology Resources Use policy as appropriate. | |||||
| 3 | No | $0 | $0 | ||
| Strengthen mobile device security controls to enforce content and data protection policies. | |||||