{"id":294,"date":"2025-12-07T17:11:02","date_gmt":"2025-12-07T17:11:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/?p=294"},"modified":"2025-12-07T17:13:55","modified_gmt":"2025-12-07T17:13:55","slug":"creating-cybersecurity-policies","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/2025\/12\/07\/creating-cybersecurity-policies\/","title":{"rendered":"Creating Cybersecurity Policies"},"content":{"rendered":"\n<p>Cryptography Policy<br>Organization: Titan Financial Group (TFG)<br>Effective Date: September 27, 2025<br>Approved By: Chief Information Security Officer (CISO)<br>Version: 1.0<br>1.Purpose<br>The purpose of this policy is to create consistent, organization- wide requirements for the<br>use of cryptography at Titan Fianacial Group (TFG). By implementing strong cryptography<br>practices, TFG seeks to ensure the confidentiality, integrity, and availability of customer,<br>employee, and corporate information while meeting regulatory requirements.<\/p>\n\n\n\n<p>2. Scope<br>This policy applies to:<br>\u2022 All TFG information systems, applications, networks, and databases.<br>\u2022 All TFG employees, contractors, and third parties with access to company systems<br>\u2022 All cryptographic technologies are used to secure sensitive financial and personal<br>data.<\/p>\n\n\n\n<p>3. Strategy and Planning<br>3.1 Strategic Goals<br>\u2022 Adherence to Regulation: Establish all encryption practices align with global<br>financial regulations.<br>\u2022 Enterprise Stability: Lower exposure of fraud, breaches, and service interruptions by<br>implementing strong encryption and key management<br>\u2022 Assurance of Data Security: Maintain customer trust by safeguarding transactions<br>and communications.<br>3.2 Strategic Approach<br>\u2022 Assign budget and resources to maintain up-to-date encryption technologies and<br>staff training.<br>\u2022 Perform yearly cryptography risk evaluations<br>\u2022 Create a CISO-led Cryptography Steering Committee to evaluate new threats,<br>strategize future upgrades, and update policies.<\/p>\n\n\n\n<p>4. Rules and Protocols <\/p>\n\n\n\n<p>4.1 Approved Algorithms and Protocols<br>\u2022 Implement only industry-standard approved encryption algorithms.<br>\u2022 Deprecated algorithms (MD5, SHA-1, DES) are prohibited.<br>4.2 Secure Key Handling<br>\u2022 Access to cryptographic keys is restricted to authorized staff with multi-factor<br>authentication.<br>\u2022 At least yearly, keys must be rotated and destroyed properly at the end of their<br>lifecycle.<br>\u2022 Keys must be created and stored using approved Hardware Security Modules<br>(HSMs).<br>4.3 Secure Data Handling<br>\u2022 In Transit: All sensitive transactions must be protected by TLS 1.2 or higher.<br>\u2022 At Rest: All customer financial data must be encrypted using AES-353 or<br>stronger.<br>\u2022 Mobile\/Removable Media: Full-disk encryption must be enabled on company<br>mobile devices, portable drives, and laptops.<\/p>\n\n\n\n<p>5 Responsibilities<br>\u2022 CISO: Monitors cryptography practices, approve standards, and ensures<br>alignment with strategy.<br>\u2022 IT Security Team: Implements encryption measures, conducts monitoring<br>\u2022 Employees: are required to follow encryption guidelines when accessing or<br>storing sensitive data.<br>\u2022 Cryptography Committee: Review risk and update the cryptography roadmap<br>yearly.<br>6 Compliance and Enforcement<br>Failure to follow this policy will result in disciplinary actions in place. This includes<br>Access to system being revoked or termination of employment. Violations may result<br>in cancellation or suspension of contractual agreements.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography PolicyOrganization: Titan Financial Group (TFG)Effective Date: September 27, 2025Approved By: Chief Information Security Officer (CISO)Version: 1.01.PurposeThe purpose of this policy is to create consistent, organization- wide requirements for theuse of cryptography at Titan Fianacial Group (TFG). By implementing strong cryptographypractices, TFG seeks to ensure the confidentiality, integrity, and availability of customer,employee, and corporate information&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/2025\/12\/07\/creating-cybersecurity-policies\/\">Read More<\/a><\/div>\n","protected":false},"author":31486,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/users\/31486"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/posts\/294\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}