MINERVA_Logo_white

EDU

SB820 Compliance Made Easy

Implementing a cybersecurity policy can be complicated and frustrating.  This effort can be magnified by the language used in regulations and mandates.  Additionally, regulations may, or may not, come with additional funding making the implementation even more challenging for many ISDs.  Do not worry…there is good news.

THIS IS HOW WE DO IT

1
ADOPT A POLICY
(Section 1.B)

Use Our Policy Library

Starting from scratch, or just filling the gaps, we have a policy library with templates mapping directly to the TX Cyber Security Framework (TX CSF).

4
NO CONFLICT WITH DIR
(Section 1.C)
Designed With TEA

We worked with the TEA to ensure that the Minerva Edu platform is compliant by design.

2
SECURE THE INFRASTRUCTURE
(Section 1.B.1)

Assess Your Security Program

The Minerva platform is specifically designed to help users navigate the TX CSF.  Our onboarding process provides access to subject matter experts that are experienced in policy implementation and assessment to ease and guide IT teams on the cybersecurity journey.  

5
Assign A Cyber-Coordinator
(Section 1.D)
Identify A Cyber-Coordinator

We allow for the identification and assignment of a cyber coordinator, but take this a step further allowing the organization to identify functional ownership of the various parts of the cybersecurity policy.

3
DETERMINE THE RISK & PLAN
(Section 1.B.2)

Report The Results

Communication continues to be one of the greatest challenges at all levels of Cybersecurity.  Designed by Chief Information Security Officers, the Minerva Dashboards and Reporting provide one-click reporting for your stakeholders.

6
Notification of Incident and Data Loss
(Section 1.E & 1.F)
Use Available Templates

Leverage the following reporting templates provided for Incident Response from the TX DIR.