A watershed moment for federal information technology managers, who since 2002 have been required to follow a law that critics say forces IT staffs to spend days filling out reports that confirm technology managers have followed certain security procedures.
The Cyber Challenge has set as its national goal to identify and train an army of cybersecurity experts to help fill shortages in industry and government. Campuses like Cal Poly are helping to lead the charge.
Draft Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans released (800-53A rv 1).
A brief biography on our key professionals can be found below along with their respective
resumes in Word (*.docx) and Portable Document Format (*.pdf). Right click on the
links to save the resumes.
Yi Zhang, CISA, CISSP, CRISC, PMP
IT Security Specialist -
Yi is a consultant specializing in the area of IT security with an emphasis on assurance, advisory and security consulting services. He has over 6 years of experience focusing on information security, including: risk assessments, security assessments, controls compliance, IT audits, flaw remediation, and secure web-based application architecture and programming. In addition to his technical and security skills, Yi possesses strong writing, mentorship, leadership and interpersonal skills.
Resume (.pdf) Resume (.docx)