Enterprise information security architecture

Results: 258



#Item
161Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / National Telecommunications and Information Administration / Domain name system / Internet / Internet protocols

Microsoft Word - Loraine Beyer, AT&T Enterprise Architecture

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2008-10-28 13:38:29
162Data / Data Reference Model / Information security / Service-oriented architecture / Enterprise architecture / Database management system / Data governance / Data integration / National Information Exchange Model / Data management / Information technology management / Information

Statewide Data Strategy Report

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2014-05-09 16:26:28
163Federated identity management / Enterprise architecture framework / Computer security / Information technology management / Management / Enterprise architecture / Identity management / Identity

Identity and Access Management (IdAM), Version 1.0 Final

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2014-05-09 16:26:26
164Chief information security officer / Federal enterprise architecture / Enterprise architect / Corporate governance of information technology / Business architecture / Information security management system / Government Enterprise Architecture / Information security / Enterprise Architecture Assessment Framework / Enterprise architecture / Information technology management / Management

1) Need a one page Executive Summary suitable for posting on the NASCIO website

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2006-08-28 09:45:39
165Federal enterprise architecture / Chief information officer / United States Environmental Protection Agency / Clinger–Cohen Act / Information security / Government / Public safety / United States Office of Management and Budget / Enterprise architecture / Security

INFORMATION TECHNOLOGY INFRASTRUCTURE STANDARDS PROCEDURE

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2013-04-17 10:53:51
166Chief information officer / Information security / National security / Enterprise Architecture Assessment Framework / SRA International / Computer security / Security / Public safety

http://www.dreamstime.com/-image27127166

Add to Reading List

Source URL: gta.georgia.gov

Language: English - Date: 2014-04-30 14:39:12
167Management / Administration / Public records / Software requirements / Records management / Requirement / Enterprise architecture / Information security / Project manager / Content management systems / Business / Information technology management

Functional Requirements and Attributes for Records Management Services, December 7, 2005

Add to Reading List

Source URL: www.archives.gov

Language: English - Date: 2011-12-06 09:40:10
168Business / Legacy system / Chief information officer / Information security / Nascio / Service-oriented architecture / Enterprise resource planning / Technology / Information systems / Management

NASCIO: Representing Chief Information Officers of the States Founded in 1969, the National Association of State Chief Information Officers (NASCIO) represents state chief information officers and information technolog

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2009-02-06 15:20:55
169Security / Computer security / Information science / Computing / Regulatory compliance / Information security / Enterprise architect / Department of Defense Architecture Framework / Governance /  risk management /  and compliance / Data security / Enterprise architecture / Information technology management

Compliance Review Compliance reviews establish whether a given architectural description meets such critical elements of business and technology governance as: Governance policies and requirements Performance metrics

Add to Reading List

Source URL: dodcio.defense.gov

Language: English - Date: 2012-03-10 11:17:40
170Education / Corporate governance of information technology / SOA governance / Governance / Information security management system / Regulatory compliance / Enterprise architect / Data governance / Governance in higher education / Information technology management / Information technology governance / Business

Architecture Maturity: The PDCA Cycle The architecture maturity cycle is based on the well recognized Plan-Do-Check-Act cycle, a four phase cycle for implementing change. Refer to Figure[removed]Repetition of the PDCA c

Add to Reading List

Source URL: dodcio.defense.gov

Language: English - Date: 2012-03-10 11:18:18
UPDATE