{"id":151,"date":"2023-11-23T00:17:37","date_gmt":"2023-11-23T00:17:37","guid":{"rendered":"http:\/\/10.1.250.135\/ozus\/?page_id=151"},"modified":"2023-11-23T16:07:58","modified_gmt":"2023-11-23T16:07:58","slug":"strategic-security","status":"publish","type":"page","link":"https:\/\/ozus.com\/index.php\/strategic-security\/","title":{"rendered":"Strategic Security"},"content":{"rendered":"\n<p>Businesses must protect their assets, employees, customers and shareholders from an rapidly-changing threat-matrix, encompassing workplace violence, cyber crimes, natural disasters or terrorism.<\/p>\n<p>Security processes must be interwoven into businesses continuity creating a<br \/>culture that reflects the very health, vitality and integrity of a business.<\/p>\n<p>OZUS using the NSA methodolgies works with our client as a partner to develop security solutions that are<br \/>far more in depth than a security audit. We are not in the business of finger-pointing which has an adversarial nature.<br \/>Most audits only show what is wrong, when was the last time an auditor said what your company did right.<br \/>In order for an auditing company to keep coming back to your business they need to show your short comings to prove their value.<br \/>We have learned, over the years, the asset of your employees having a greater understanding of where<br \/>vulnerabilities lie in the environment, and to let them express their concerns and solutions to help remediate. The best security<br \/>is when everyone is on the team to protect the business, without fear of embarrassment or losing their jobs.<\/p>\n<center><img decoding=\"async\" src=\"\/images\/_images\/content_sh1.png\" alt=\"-\" width=\"100%&quot;\" height=\"20\" \/><\/center>\n<h2>Baseline Methodologies<\/h2>\n<ul>National Security Agency&#8217;s Information Security Assessment Methodology.<\/ul>\n<ul>National Security Agency&#8217;s Information Security Evaluation Methodology.<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>National Institute of Standards and Technology (NIST).\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Special Publications 500\/800<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Federal Information Processing Standards (FIPS).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>ITIL business processes and governance standards.<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Businesses must protect their assets, employees, customers and shareholders from an rapidly-changing threat-matrix, encompassing workplace violence, cyber crimes, natural disasters or terrorism. Security processes must be interwoven into businesses continuity creating aculture that reflects the very health, vitality and integrity of a business. OZUS using the NSA methodolgies works with our client as a partner &#8230; <a title=\"Strategic Security\" class=\"read-more\" href=\"https:\/\/ozus.com\/index.php\/strategic-security\/\" aria-label=\"Read more about Strategic Security\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-151","page","type-page","status-publish"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ozus.com\/index.php\/wp-json\/wp\/v2\/pages\/151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ozus.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ozus.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ozus.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ozus.com\/index.php\/wp-json\/wp\/v2\/comments?post=151"}],"version-history":[{"count":1,"href":"https:\/\/ozus.com\/index.php\/wp-json\/wp\/v2\/pages\/151\/revisions"}],"predecessor-version":[{"id":152,"href":"https:\/\/ozus.com\/index.php\/wp-json\/wp\/v2\/pages\/151\/revisions\/152"}],"wp:attachment":[{"href":"https:\/\/ozus.com\/index.php\/wp-json\/wp\/v2\/media?parent=151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}