
EDU
Implementing a cybersecurity policy can be complicated and frustrating. This effort can be magnified by the language used in regulations and mandates. Additionally, regulations may, or may not, come with additional funding making the implementation even more challenging for many ISDs. Do not worry…there is good news.
THIS IS HOW WE DO IT
(Section 1.B)
Use Our Policy Library
Starting from scratch, or just filling the gaps, we have a policy library with templates mapping directly to the TX Cyber Security Framework (TX CSF).
(Section 1.C)
We worked with the TEA to ensure that the Minerva Edu platform is compliant by design.
(Section 1.B.1)
Assess Your Security Program
The Minerva platform is specifically designed to help users navigate the TX CSF. Our onboarding process provides access to subject matter experts that are experienced in policy implementation and assessment to ease and guide IT teams on the cybersecurity journey.
(Section 1.D)
We allow for the identification and assignment of a cyber coordinator, but take this a step further allowing the organization to identify functional ownership of the various parts of the cybersecurity policy.
(Section 1.B.2)
Report The Results
Communication continues to be one of the greatest challenges at all levels of Cybersecurity. Designed by Chief Information Security Officers, the Minerva Dashboards and Reporting provide one-click reporting for your stakeholders.
(Section 1.E & 1.F)
Leverage the following reporting templates provided for Incident Response from the TX DIR.