You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Turn on more accessible mode
Turn off more accessible mode
Skip Ribbon Commands
Skip to main content
Turn off Animations
Turn on Animations
Use SHIFT+ENTER to open the menu (new window).
To navigate through the Ribbon, use standard browser navigation keys. To skip between groups, use Ctrl+LEFT or Ctrl+RIGHT. To jump to the first Ribbon tab use Ctrl+[. To jump to the last selected command use Ctrl+]. To activate a command, use Enter.
Tab 1 of 3.
Tab 2 of 3.
Tab 3 of 3.
Fire Academy & Inservice Training
Committees & Groups
MLK Day of Services
Pulse BI Consortium
Moving the Needle Demo
State College of Florida Demo
College of Central Florida Demo
Hillsborough Community College Demo
St. Johns River State College Demo
Procurement Card (PCARD)
SPC Technical Support
Information Security Plan
Information Security Awareness
SPC Technical Support
The mission of the SPC Information Security Office is to design, implement, and maintain an information security program to protect SPC's systems, services and data against unauthorized use, disclosure, modification, damge or loss. The Information Security Department is committed to engaging the SPC community to establish an appropriate information security governance structure that enables effective collaboration and ensures alignment with SPC strategic objectives and foundational commitments.
A pervasive information security awareness program
An effective information security governance structure
A robust and scalable security architecture
Well managed and maintained computing equipment
Well managed and maintained enterprise applications
Well managed and maintained third-party relationships
Mitigate security risk through outreach, awareness, assessment, policy, and best practices
Participate in the monitoring of systems to detect and address malicious activity
Respond to security incidents and performs digital forensic operations
Participate in the design of architecture changes and in the planning of new systems
Perform risk assessments and vulnerability management operations