Federal Information Security Management Act

Results: 1715



#Item
131Computer security / Financial institutions / Finance / Financial services / United States federal banking legislation / Dodd–Frank Wall Street Reform and Consumer Protection Act / Federal Savings and Loan Insurance Corporation / Federal Information Security Management Act / Financing Corporation / Bank regulation in the United States / Federal Deposit Insurance Corporation / Financial regulation

GAO[removed], INFORMATION SECURITY: FDIC Implemented Many Controls over Financial Systems, but Opportunities for Improvement Remain

Add to Reading List

Source URL: www.gao.gov.

Language: English - Date: 2015-04-09 14:15:42
132Computing / Department of Defense Information Assurance Certification and Accreditation Process / Federal Information Security Management Act / Backup / Host Based Security System / Security / Computer security / Data security

Security Manager Cybernet Security Manager A Proven Solution to Cybersecurity Challenges at Competitive Prices Cybernet’s Security Manager delivers solutions to your Cybersecurity and Information Assurance (IA) managem

Add to Reading List

Source URL: cybersecurity.cybernet.com

Language: English - Date: 2015-03-31 10:56:30
133Security Content Automation Protocol / Federal Information Security Management Act / National Institute of Standards and Technology / Information security / NIST Special Publication 800-53 / Security Technical Implementation Guide / Computer security / Security / Computing

National Checklist Program for IT Products

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-26 12:36:42
134Health / Federal assistance in the United States / Healthcare reform in the United States / Presidency of Lyndon B. Johnson / Pharmacy / Medicaid / Medicare / Off-label use / False Claims Act / Pharmacology / Pharmaceutical sciences / Medicine

Briefing Paper Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security The Financial And Societal Costs Of Medicating America’s

Add to Reading List

Source URL: www.psychrights.org

Language: English - Date: 2011-12-22 23:33:33
135Computing / Security information and event management / Federal Information Security Management Act / Security event manager / Cloud computing / Certification and Accreditation / Information security / Regulatory compliance / Computer security / Data security / Security

w w w. n e t f o r e n s i c s . c o m Federal Solutions Our Security Information and Event Management (SIEM) solutions provide a top layer of correlation, analysis and intelligence across the portfolio of deployed secu

Add to Reading List

Source URL: www.blackstratus.com

Language: English - Date: 2012-05-17 09:38:34
136Platform as a service / Software as a service / Federal Information Security Management Act / IICCRD / IBM cloud computing / Cloud computing / Centralized computing / Computing

ITAPS Draft Response to IT Schedule 70 Cloud SIN Request for Information (RFI) Responses Table 1: Administrative Information

Add to Reading List

Source URL: itaps.itic.org

Language: English - Date: 2014-09-02 16:48:40
137Cloud computing / Computer security / National Institute of Standards and Technology / Government procurement in the United States / General Services Administration / Federal Information Security Management Act / Unisys / Federal Information Processing Standard / Data center / Computing / Concurrent computing / Distributed computing

B[removed],B[removed],B[removed]Technosource Information Systems, LLC; TrueTandem, LLC

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2011-10-17 15:22:02
138Cyberwarfare / Computer network security / Secure communication / Data security / Military technology / Data breach / Personally identifiable information / Rapid7 / Federal Information Security Management Act / Security / Computer security / Computing

Data Breaches in the Government Sector A Rapid7 Research Report Summary of Report Across all industries, data breaches and the protection of business-critical data remain a top concern. While the government sector has r

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2012-11-30 10:06:38
139Computing / Information technology management / Computer law / Federal Information Security Management Act / Information technology audit / Cloud computing / Information security / Security controls / Computer security / Data security / Security

Executive Summary: Security Control Review of the CFPB’s Tableau System

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2015-04-03 09:00:29
140Data security / Computer law / Software testing / Vulnerability / Federal Information Security Management Act / Information security / Spreadsheet / Point of Access for Providers of Information / Computer security / Security / Cyberwarfare

FedRAMP Plan of Action and Milestones (POA&M) Template Completion Guide

Add to Reading List

Source URL: www.fedramp.gov

Language: English - Date: 2015-03-05 15:48:37
UPDATE