![Business professional utilizing cybersecurity techniques.](/-/media/feature/westernsouthern/hero/herospacesmall/fw-cyber-program.jpg?rev=4ffabbdf5dfa46b4a6692a3b04ba7349&la=en&h=682&w=1968&hash=1499D28151EEAF71F9B5BAEFADFCE34C7B29D17E)
Cybersecurity Program
Program Controls
![Businessman working to analyze graphs and financial reports in documents and the computer.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/ethics-and-integrity/ethics-and-integrity1/ethics_integrity/program-controls-hero-space.jpg?rev=6a358c2cd5a5471b9afd92e385f14865&la=en&h=271&mw=440&w=440&hash=D5D0A2F6C14DDFA261EC9172D44910160C57AE46)
The program includes controls to prevent and correct potential issues related to:
Protecting Data and Assets
Limiting Exposure
Monitoring and Responding
Incident Response Plan
![Business professionals analyze data on the computer.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/privacy_info-security/incident-response-plan.jpg?rev=13d27c8ffce14f2991d9279fbf8f3ad7&la=en&h=293&mw=440&w=440&hash=59C62659F901E38272C271BADD34124580AD846E)
This Plan Outlines Our Commitment to:
Robust Associate Training
Connecting With the Cybersecurity Community
![Professional expert speaking to an audience.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/cyber-program-cybersecurity-experts.jpg?rev=b02e086a449d42f8a209b08c12846bb2&la=en&h=266&mw=440&w=440&hash=E2112FEDC4739EAFD551046105DF61EDF930A09F)
Cybersecurity Experts
Phishing Awareness
![Businessman declining action with a phishing email. Phishing awareness concept.](/-/media/feature/westernsouthern/content-blocks/lefty-righty/phishing-awareness-new.jpg?rev=c2481a2b0e644893bd65a32ad70d7955&la=en&h=294&mw=440&w=440&hash=2463C8CE812CA70B6AB797C9D5292F2492FCB586)
Associate Preparation