The Office shall:

Ask a legal question, get an answer ASAP!
Click here to chat with a lawyer about your rights.

1.  Develop procedures for risk-based assessments that identify vulnerabilities in the information systems that are operated or maintained by state agencies and any potential threats that may exploit such vulnerabilities.

2.  Based on the results of risk-based assessments, identify risks to the security of information systems that are operated or maintained by state agencies.

3.  Develop best practices for preparing for and mitigating risks to, and otherwise protecting, the security of information systems that are operated or maintained by state agencies.