Data auditing

Results: 1280



#Item
81BS 25999 / Auditing / Data security / Business continuity / Easy2comply / Computer security / Information security / Internal audit / Risk assessment / Risk / Business / Security

Business Continuity Management Dynasec’ easy2complyTM provides a comprehensive framework to manage your organization’s Business Continuity Management program. BCM software is one module from within easy2comply’s b

Add to Reading List

Source URL: www.dynasec.org

Language: English - Date: 2015-02-15 14:40:45
82Data security / Business / ISO/IEC 27001 lead auditor / Computer security / ISO/IEC 27001 / Information security management system / Audit / Business continuity / Internal audit / Risk / Auditing / Security

PDF Document

Add to Reading List

Source URL: bascertification.com

Language: English - Date: 2013-06-04 08:15:33
83Risk management / Actuarial science / Auditing / Data security / Enterprise risk management / IT risk management / ISO 31000 / Corporate social responsibility / IT risk / Risk / Management / Security

Risk Management Policy A Treasury Wine Estates Limited Policy 1 – INTRODUCTION / CONTEXT TWE’s continued growth and success depends on our ability to understand and respond to the challenges of the environments we op

Add to Reading List

Source URL: www.tweglobal.com

Language: English - Date: 2015-04-08 01:21:02
84Crime prevention / National security / Computer security / Information security / Backup / Application software / Computer network / Access control / Database management system / Security / Public safety / Data security

INTOSAI EDP COMMITTEE Information Systems Auditing – Glossary of ICT Terms Information Systems Auditing – Glossary of Terms Subject/term/acronym Description

Add to Reading List

Source URL: www.intosaiitaudit.org

Language: English - Date: 2013-01-31 00:02:06
85Data security / Computer network security / Crime prevention / National security / Information security / Benchmarking / Security controls / Vulnerability / SekChek Classic / Security / Computer security / Cyberwarfare

 Core Competencies SekChek Services & Solutions SekChek provides host system auditing, benchmarking and security assessment services for IT

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-02-01 09:23:39
86National security / Database management systems / Public safety / Computing / Computer security / Backup / Audit trail / Information security / Database / Security / Data security / Crime prevention

INTOSAI EDP COMMITTEE INTOSAI EDP Information Systems Auditing

Add to Reading List

Source URL: www.intosaiitaudit.org

Language: English - Date: 2013-01-31 00:02:04
87Audit / Business / Business analytics / Business intelligence / Data warehousing

SIKS workshop Smart Auditing Wednesday, Feb 25, 2015 Location: Tilburg University Registration:

Add to Reading List

Source URL: www.siks.nl

Language: English - Date: 2015-01-22 03:10:25
88Cyberwarfare / Auditing / Software testing / Vulnerability / Information security / Fraud deterrence / Security / Data security / Computer security

Internal Business Security Handbook

Add to Reading List

Source URL: www.dsdni.gov.uk

Language: English - Date: 2006-01-06 08:57:53
89Management / Ethics / Auditing / Data security / Information technology audit / Information Systems Audit and Control Association / Risk management / Risk factor / Professional certification / Risk / Security / Actuarial science

Microsoft Word - CGEIT.doc

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2012-11-28 20:01:03
90Clinical audit / Royal Australasian College of Surgeons / Audit / Surgeon / Auditing / Health / Medicine

SUBMISSION FOR DATA REQUESTS

Add to Reading List

Source URL: www.anzgosa.org

Language: English - Date: 2014-08-11 02:02:04
UPDATE