Document Library

This vast, searchable library includes IT-related documents containing plans, reports, policies, standards, guidelines, procedures, technology briefs, and other publications. It also includes draft documents posted for peer review and use by state agencies and institutions of higher education.

Please note that some of the documents on this page are in the PDF format. Please download the Adobe Reader in order to view these documents. About file formats.

How to refine your search using the filters:

In addition to searching by document type provided in the left-hand navigation, additional filters are provided below to search the library by specific DIR business areas.

Filter By
Cancel
  • Department
Cancel

Event Materials

ISF 2015 Can Technology Save Us - May 2015 (PDF|5.26MB) Third-party content presented at 2015 ISF Conference by Bruce Roton/Level 3 Communications: Can Technology Save Us, 05/21/15, PDF

May 2015

ISF 2015 Beyond the Breach - May 2015 (PPSX|2.47MB) Third-party content presented at 2015 ISF Conference by Trent Greenwood/RSA: Beyond the Breach - Threats and Business Risk, 05/20/15, PPTX

May 2015

ISF 2015 Continuous Diagnostics Monitoring- May 2015 (PPSX|5.98MB) Third-party content presented at 2015 ISF Conference by Calvin Smith/Northrop Grumman: Continuous Diagnostics Monitoring & End-to-End Monitoring, 05/20/15, PPTX

May 2015

ISF 2015 Cyber, A Militarized Domain - May 2015 (PPSX|650.54KB) Third-party content presented at 2015 ISF Conference by DuWayne E Aikins, Jr/AT&T: Cyber, A Militarized Domain: What it Means for Texas, 05/20/15, PPTX

May 2015

ISF 2015 Defending Against Malware - May 2015 (PPSX|19.29MB) Third-party content presented at 2015 ISF Conference by Brandon Newport/Cisco: Defending Against Malware - Before, During and After the Attack, 05/20/15, PPTX

May 2015

ISF 2015 Effective Use of Cyber Ranges - May 2015 (PPSX|26.88MB) Third-party content presented at 2015 ISF Conference by Bob DuCharme/Ixia: The Effective Use of Cyber Ranges for Application and Attack Simulation, 05/20/15, PPTX

May 2015

ISF 2015 Executive Reporting - May 2015 (PPSX|7.5MB) Third-party content presented at 2015 ISF Conference by Trey Ford/Rapid7: Executive Reporting in the Age of Continuous Compromise, 05/20/15, PPTX

May 2015

ISF 2015 Formulating a Security Policy - May 2015 (PPSX|383.42KB) Third-party content presented at 2015 ISF Conference by Cris Thomas (Space Rogue)/Tenable: Formulating a Security Policy for the Modern IT Landscape, 05/20/15, PPTX

May 2015

ISF 2015 Ghetti Keynote - May 2015 (PPSX|1.72MB) Third-party content presented at 2015 ISF Conference by Adam Ghetti/Ionic Security: Opening Keynote Presentation, 05/20/15, PPTX

May 2015

ISF 2015 Intelligent Security - Defending the Digital Enterprise - May 2015 (PPSX|1.25MB) Third-party content presented at 2015 ISF Conference by Lalit Ahluwalia/Accenture: Intelligent Security - Defending the Digital Enterprise, 05/20/15, PPTX

May 2015

ISF 2015 IS Governance - Evolution Towards Maturity - May 2015 (PPSX|1.63MB) Third-party content presented at 2015 ISF Conference by Dave Gray/Comptroller of Public Accounts: Information Security Governance - An Agency's Evolution Toward Maturity, 05/20/15, PPTX

May 2015

ISF 2015 It's All About the Apps - May 2015 (PPSX|2.01MB) Third-party content presented at 2015 ISF Conference by Joseph Krull/Denim Group: It's No Longer the Network - Now It's All About the Apps, 05/20/15, PPTX

May 2015

ISF 2015 New Era of Security - May 2015 (PPSX|5.29MB) Third-party content presented at 2015 ISF Conference by Bob Kalka/IBM: A New Era of Security for a New Era of Computing, 05/20/15, PPTX

May 2015

ISF 2015 Ramzan Keynote - May 2015 (PPSX|11.59MB) Third-party content presented at 2015 ISF Conference by Zulfikar Ramzan/RSA: ISF Lunch Keynote by Dr. Ramzan, 05/20/15, PPTX

May 2015

ISF 2015 Role of Threat Intelligence_Layered Security - May 2015 (PPSX|4.42MB) Third-party content presented at 2015 ISF Conference by Ted Gruenloh/Sentinel IPS: The Role of Threat Intelligence/Layered Security for Intrusion Prevention in the Post-Target Breach Era, 05/20/15, PPTX

May 2015

ISF 2015 SDDC and Network Virtualization - May 2015 (PPSX|2.38MB) Third-party content presented at 2015 ISF Conference by Rob Randell/VMWare: SDDC and Network Virtualization: An Inherently Better Security Model, 05/20/15, PPTX

May 2015

ISF 2015 Security Governance Best Practices and Trends - May 2015 (PPSX|2.04MB) Third-party content presented at 2015 ISF Conference by Bob Smock/Gartner: Security Governance Best Practices and Trends in State Government, 05/20/15, PPTX

May 2015

ISF 2015 Single Identity - Multiple Services - May 2015 (PPSX|5.75MB) Third-party content presented at 2015 ISF Conference by Wade Tongen/Centrify/CTS: Single Identity - Multiple Services - How Do I Stay Compliant?, 05/20/15, PPTX

May 2015

ISF 2015 Vulnerability and Configuration Best Practices - May 2015 (PPSX|2.34MB) Third-party content presented at 2015 ISF Conference by Jonathan Trull/Qualys: Vulnerability and Configuration Best Practices for State and Local Governments, 05/20/15, PPTX

May 2015

ISF 2015 Fight Back Against Cybercrime - May 2015 (PDF|1.61MB) Third-party content presented at 2015 ISF Conference by Ricky Link/Coalfire Systems: Fight Back Against Cybercrime, 05/20/15, PDF

May 2015