Enterprise information security architecture

Results: 258



#Item
141Software architecture / Computer security / Information technology management / Enterprise application integration / Software engineering / Web services

Building a Common Application Streamlining the Human Services Intake Process Background Over the last several years, the need for increased human services is apparent. Due to this increased need as well as other environm

Add to Reading List

Source URL: www.americaachieves.org

Language: English - Date: 2013-02-04 14:05:34
142Data security / Government / Enterprise architecture / OMB Circular A-130 / Information security / Chief information officer / Federal Information Security Management Act / United States Environmental Protection Agency / Clinger–Cohen Act / United States Office of Management and Budget / Computer security / Security

System Life Cycle Management Policy

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2009-12-18 16:07:00
143Federal enterprise architecture / Clinger–Cohen Act / Enterprise architect / Information security / OMB Circular A-130 / Chief information officer / Enterprise Architecture Assessment Framework / Department of Defense Architecture Framework / United States Office of Management and Budget / Information technology management / Enterprise architecture

Enterprise Architecture Policy

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2009-12-18 16:07:37
144Enterprise architecture / Federal enterprise architecture / Management / Computing / Information / United States Office of Management and Budget / Interoperability / Telecommunications

MTAF Project Overview - Security Conference[removed]04MB, PDF)

Add to Reading List

Source URL: doit.maryland.gov

Language: English - Date: 2014-08-27 20:52:28
145Enterprise architecture / Computing / Information Technology Infrastructure Library / Information technology management / Method engineering / Standards / Information security / Strategic management / Enterprise architect / Management / Data security / Security

SAM – INFORMATION TECHNOLOGY (California Department of Technology) Note: Effective January 1, 2008, the Office of Information Security (Office) restructured and renumbered the content and moved SAM Sections 4840 – 48

Add to Reading List

Source URL: www.documents.dgs.ca.gov

Language: English - Date: 2014-09-06 22:26:32
146Federal enterprise architecture / Clinger–Cohen Act / Enterprise architect / Information security / OMB Circular A-130 / Chief information officer / Enterprise Architecture Assessment Framework / Enterprise information security architecture / United States Office of Management and Budget / Information technology management / Enterprise architecture

Enterprise Architecture Policy

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2009-12-18 16:05:35
147Enterprise architecture / Data security / Chief information officer / Information security / Clinger–Cohen Act / Federal Information Security Management Act / Public safety / Management / Computer security / Security / United States Office of Management and Budget

SYSTEM LIFE CYCLE MANAGEMENT (SLCM) POLICY

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2012-10-11 14:57:52
148Management / Government / Chief financial officer / Enterprise Architecture Assessment Framework / United States Office of Management and Budget / Performance measurement / Information security management system

Memo #3: Management Strategies for Working with Agencies This memo focuses on management strategies to create the conditions for successful implementation of the Modernization Act. Key Actions in the First Year Creating

Add to Reading List

Source URL: www.memostoleaders.org

Language: English - Date: 2012-11-13 10:09:01
149Information science / United States Department of Homeland Security / Computing / Enterprise architect / Management / Science / Visual arts / Center for Information Technology / California Emergency Management Agency / Enterprise architecture / Design / Human resource management

NOAA Circular[removed]January 14, 2008

Add to Reading List

Source URL: www.corporateservices.noaa.gov

Language: English - Date: 2011-08-25 12:22:14
150Data security / Computer security / Data management / Federal enterprise architecture / Data architecture / Clinger–Cohen Act / United States Environmental Protection Agency / Enterprise architect / Information security / Information technology management / Enterprise architecture / United States Office of Management and Budget

Interim Enterprise Architecture Policy – September 9, 2004

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2009-12-18 16:05:36
UPDATE