, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including... hardware, firmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards...