You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Turn on more accessible mode
Turn off more accessible mode
Skip Ribbon Commands
Skip to main content
Turn off Animations
Turn on Animations
Use SHIFT+ENTER to open the menu (new window).
To navigate through the Ribbon, use standard browser navigation keys. To skip between groups, use Ctrl+LEFT or Ctrl+RIGHT. To jump to the first Ribbon tab use Ctrl+[. To jump to the last selected command use Ctrl+]. To activate a command, use Enter.
Tab 1 of 3.
Tab 2 of 3.
Tab 3 of 3.
Fire Academy & Inservice Training
Committees & Groups
MLK Day of Services
Pulse BI Consortium
Moving the Needle Demo
State College of Florida Demo
College of Central Florida Demo
Hillsborough Community College Demo
St. Johns River State College Demo
Procurement Card (PCARD)
Information Security Awareness
Information Security Plan
The mission of the SPC Information Security Office is to design, implement and maintain an information security program that protects SPC's systems, services and data against unauthorized use, disclosure, modification, damgeor loss. The Information Security Department is committed to engaging the SPC community to establish an appropriate information security governance structure that enables effective collaboration and ensures alignment with SPC strategic objectives and foundational commitments.
A pervasive Information Security Awareness Program
An effective information security governance structure
A robust and scalable security architecture
Well managed and maintained computing equipment
Well managed and maintained enterprise applications
Well managed and maintained third-party relationships
Mitigates security risk through outreach, awareness, assessment, policy, and best practices
Participates in the monitoring of systems to detect and address malicious activity
Responds to security incidents and performs digital forensic operations
Participates in the design of architecture changes and in the planning of new systems
Performs risk assessments and vulnerability management operations