Federal Information Security Management Act

Results: 1715



#Item
151Federal Information Security Management Act / Cyberwarfare / Cloud computing / Regulatory compliance / Information security / Security controls / Standards for Security Categorization of Federal Information and Information Systems / NIST Special Publication 800-53 / Security Content Automation Protocol / Computer security / Computing / Security

A COALFIRE WHITEPAPER FISMA vs. FedRAMP: Controls and Authorization Differences by Omar Malik, CISA, FITSP Abel Sussman, CISSP

Add to Reading List

Source URL: 1105govinfoevents.com

Language: English
152Computer network security / Software testing / Security / Risk / Rapid7 / Metasploit Project / Vulnerability / Federal Information Security Management Act / Risk management / Computer security / Software / Cyberwarfare

Rapid7® Nexpose® Ultimate is the only vulnerability management solution that prioritizes vulnerabilities, controls, and configurations across the modern network to make better risk management decisions, faster.

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-12-15 17:35:01
153Security / Application firewall / Barracuda Networks / Security controls / Information security / DMZ / Penetration test / NIST Special Publication 800-53 / Federal Information Security Management Act / Computing / Computer network security / Computer security

The Barracuda Web Application Firewall Ensures FISMA Compliance White Paper Barracuda Networks

Add to Reading List

Source URL: www.barracuda.com

Language: English - Date: 2013-06-24 13:38:39
154Federal Information Security Management Act / National Institute of Standards and Technology / Computing / Security / Law / Computer security / Certified Information Systems Security Professional / Data security

28th FISSEA Conference, March 3-4, 2015 Final Agenda with Presentation Links

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 13:44:43
155Law / United States federal banking legislation / Identity management / Data privacy / Security / Internet privacy / Privacy / Fair Credit Reporting Act / Online shopping / Financial economics / Credit / Ethics

PROTECTING YOUR PRIVACY IN THE INFORMATION AGE What every consumer should know about the use of individual information Table of Contents

Add to Reading List

Source URL: www.acxiom.com.br

Language: English - Date: 2013-09-18 17:22:50
156Certified Information Systems Security Professional / Data security / Federal Information Security Management Act / National Institute of Standards and Technology / Security / Computer security / Computing

FISSEA 28th Annual Conference - March 24-25, [removed]Preliminary Agenda

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-17 14:06:00
157ISO standards / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Ethics / Thought / Common Criteria / National Voluntary Laboratory Accreditation Program / Validation / Federal Information Security Management Act / Evaluation / Computer security / Common Criteria Testing Laboratory

National Information Assurance Partnership /Common Criteria Evaluation and Validation Scheme Publication #2 Quality Manual and Standard Operating Procedures

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-05-14 07:52:21
158Prevention / Software Engineering Institute / Federal Information Security Management Act / OCTAVE / Carnegie Mellon University / Information security / Vulnerability / Security risk / Computer security / Security / Public safety

A Taxonomy of Operational Cyber Security Risks Version 2

Add to Reading List

Source URL: resources.sei.cmu.edu

Language: English - Date: 2014-05-21 11:54:15
159Crime prevention / Computer network security / Cyberwarfare / CACI / Information security / Information assurance / Federal Information Security Management Act / Penetration test / National Cyber Security Division / Security / Computer security / National security

CACI Information Solutions and Services CACI Cybersecurity and Information Assurance (IA) Services Ensuring the Security and Integrity of Critical Federal Systems

Add to Reading List

Source URL: www.caci.com

Language: English - Date: 2015-04-01 15:51:09
160Information technology management / Evaluation / Computer law / Federal Information Security Management Act / Enterprise architecture / Enterprise life cycle / Capital Planning and Investment Control / Certification and Accreditation / Information security / Computer security / Data security / Security

DRAFT NIST Special PublicationIntegrating IT Security into the Capital Planning and Investment Control Process

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-21 15:30:17
UPDATE