Federal Information Security Management Act

Results: 1715



#Item
71Federal Information Security Management Act / National Institute of Standards and Technology / Computing / Security / Law / Computer security / Data security / Certified Information Systems Security Professional

PDF Document

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-04-23 16:43:42
72Risk / Information Risk Management / Risk analysis / Federal Information Security Management Act / NIST Special Publication 800-53 / IT risk management / Certification and Accreditation / Security controls / IT risk / Computer security / Security / Data security

PDF Document

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2015-01-21 10:07:25
73Cyberwarfare / Computer security / Computer network security / Military technology / Critical infrastructure protection / Phishing / International Multilateral Partnership Against Cyber Threats / United States Computer Emergency Readiness Team / Federal Information Security Management Act / Cybercrime / Computer crimes / Security

Microsoft Word - v7-311522_-_MASTER_DRAFT_TESTIMONY_REPORT.DOCX

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2015-04-22 08:41:33
74Computer security / Federal Information Security Management Act / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / United States Department of Homeland Security / Office of Management and Budget / Public administration / Law / National Cyber Security Division / Government / Computer crimes / Computer law

Embargoed until Delivered  EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.Cwww.whitehouse.gov/omb

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2015-04-22 08:41:39
75Government / Cyberwarfare / Electronic warfare / Hacking / Military technology / Federal Information Security Management Act / Computer security / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / Security / Computer crimes / Public safety

Court Reporting Services, Inc. RPTJHolt HGO112000 ENHANCING CYBERSECURITY OF THIRD-PARTY CONTRACTORS AND VENDORS Wednesday, April 22, 2015,

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2015-05-04 12:43:34
76Public safety / Information security / Federal Information Security Management Act / Information assurance / Threat / Computer security / Security / Cyberwarfare

Interim_LEX_Primary_Logo_Large_NEW-CMYK

Add to Reading List

Source URL: perceptivesoftware.com

Language: English - Date: 2015-05-15 19:14:35
77Public safety / Information security / Federal Information Security Management Act / Information assurance / Threat / Computer security / Security / Cyberwarfare

Interim_LEX_Primary_Logo_Large_NEW-CMYK

Add to Reading List

Source URL: www.perceptivesoftware.com

Language: English - Date: 2015-05-15 19:14:35
78National security / Crime prevention / United States Department of Homeland Security / Computer law / Federal Information Security Management Act / Managed Trusted Internet Protocol Service / Einstein / Chief financial officer / Information security / Security / Public safety / Computer security

PDF Document

Add to Reading List

Source URL: www.whitehouse.gov

Language: English
79Security information and event management / Computing / Law / Electronics / Computer security / Federal Information Security Management Act / Regulatory compliance

PRESS RELEASE Tier-3 announces FISMA compliance monitoring pack for Huntsman® SIEM June 12thTier-3 announced that its Huntsman® intelligent SIEM solution now includes (out of the box) an extensive compliance mon

Add to Reading List

Source URL: www.tier-3.com

Language: English - Date: 2015-01-14 19:38:04
80Public safety / Computing / Computer law / Federal Information Security Management Act / Security awareness / Information security / National Institute of Standards and Technology / NIST Special Publication 800-53 / Information security management system / Computer security / Security / Data security

Introduction (why awareness; why training

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 05:55:59
UPDATE