CJIS Compliance -- Why it's Important, How to Achieve It

  • Presenter(s): Jason Franks
  • Session Length: 60 minutes
  • Date: Jul 27, 2025
Buy Package - See Options

This product is already in cart

Purchase this session to continue watching !!!

In October 2023, the FBI's Criminal Justice Information Services (CJIS) division mandated that law-enforcement organizations wanting to access its databases would need to have a cybersecurity vulnerability-management program in place. One approach to mandate compliance concerns establishing a well-integrated Governance, Risk, and Compliance (GRC) program. This session will explore the core components of a GRC program—risk management, policy development, incident-response planning, disaster recovery, and more.

Learning Objectives:

  1. Attendees will discover tools and techniques for measuring and enhancing the effectiveness of GRC elements, emphasizing a resilient, proactive approach to security.
  2. Attendees will learn how to identify physical-security, cybersecurity, and personnel-security perspectives — all are vitally important because security threats evolve continuously.
  3. Attendees will learn why they should adopt a continuous lifecycle approach that never stops assessing assess risks and compliance measures — again because threats evolve seemingly by the minute.

description

In October 2023, the FBI's Criminal Justice Information Services (CJIS) division mandated that law-enforcement organizations wanting to access its databases would need to have a cybersecurity vulnerability-management program in place. One approach to mandate compliance concerns establishing a well-integrated Governance, Risk, and Compliance (GRC) program. This session will explore the core components of a GRC program—risk management, policy development, incident-response planning, disaster recovery, and more.

Learning Objectives:

  1. Attendees will discover tools and techniques for measuring and enhancing the effectiveness of GRC elements, emphasizing a resilient, proactive approach to security.
  2. Attendees will learn how to identify physical-security, cybersecurity, and personnel-security perspectives — all are vitally important because security threats evolve continuously.
  3. Attendees will learn why they should adopt a continuous lifecycle approach that never stops assessing assess risks and compliance measures — again because threats evolve seemingly by the minute.

Resources

You must be logged in and have purchased access to this course to view/download the handouts.

Presenters

Browse sessions in this event