IT risk

Results: 6125



#Item
31SCRM for CDM Products CDM Tools Approved Products List (APL) Supply Chain Risk Management Plan Overview Briefing for CISQ Cyber Resilience Summit October 19, 2017

SCRM for CDM Products CDM Tools Approved Products List (APL) Supply Chain Risk Management Plan Overview Briefing for CISQ Cyber Resilience Summit October 19, 2017

Add to Reading List

Source URL: it-cisq.org

- Date: 2017-10-20 11:14:36
    32Robert A. Martin 20 March 2018 One element of Risk Management is Identifying Quality Gaps in Capabilities Critical to Mission/Business Functions

    Robert A. Martin 20 March 2018 One element of Risk Management is Identifying Quality Gaps in Capabilities Critical to Mission/Business Functions

    Add to Reading List

    Source URL: it-cisq.org

    - Date: 2018-03-21 11:24:04
      33EXECUTIVE SUMMARY Event: Cyber Resilience Summit: Modernizing and Securing Government IT Topic: Reducing Modernization Risk through Compliance to Software and Risk Management Standards Hosts: Consortium for IT Software Q

      EXECUTIVE SUMMARY Event: Cyber Resilience Summit: Modernizing and Securing Government IT Topic: Reducing Modernization Risk through Compliance to Software and Risk Management Standards Hosts: Consortium for IT Software Q

      Add to Reading List

      Source URL: it-cisq.org

      - Date: 2017-11-02 16:39:58
        34CISQ Standards for Measuring Software Risk, Security, and Technical Debt

        CISQ Standards for Measuring Software Risk, Security, and Technical Debt

        Add to Reading List

        Source URL: it-cisq.org

        - Date: 2018-03-27 13:12:49
          35H5882  was a national security risk. Those were his exact words, ‘‘a national security risk.’’ Well, if we can put the kids on a diet in school because it is a national security risk for getting people to meet th

          H5882 was a national security risk. Those were his exact words, ‘‘a national security risk.’’ Well, if we can put the kids on a diet in school because it is a national security risk for getting people to meet th

          Add to Reading List

          Source URL: www.gpo.gov

          - Date: 2017-07-15 07:22:45
            36Treatment Comparison: Natural Alternatives vs Pharmaceutical Drugs Dietary supplements are used everyday as safe and natural alternatives to risky pharmaceuticals. It is important to understand the true risk behind all t

            Treatment Comparison: Natural Alternatives vs Pharmaceutical Drugs Dietary supplements are used everyday as safe and natural alternatives to risky pharmaceuticals. It is important to understand the true risk behind all t

            Add to Reading List

            Source URL: www.botanical-education.org

              37WILLIS SPECIAL REPORT: 10K DISCLOSURES – HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the retail sector of the Fortune  It is par

              WILLIS SPECIAL REPORT: 10K DISCLOSURES – HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the retail sector of the Fortune  It is par

              Add to Reading List

              Source URL: www.willis.com

              - Date: 2014-04-14 16:50:47
                38A SEARCHCOMPLIANCE.COM/SEARCHSECURITY.COM E-BOOK  Governance, Risk, Compliance POLICY MANAGEMENT: METHODS AND TOOLS IT managers are looking to governance structures and the discipline of risk management to help them

                A SEARCHCOMPLIANCE.COM/SEARCHSECURITY.COM E-BOOK Governance, Risk, Compliance POLICY MANAGEMENT: METHODS AND TOOLS IT managers are looking to governance structures and the discipline of risk management to help them

                Add to Reading List

                Source URL: cdn.ttgtmedia.com

                - Date: 2009-05-12 17:13:24
                  39IT Accessibility Risk Statements and Evidence

                  IT Accessibility Risk Statements and Evidence

                  Add to Reading List

                  Source URL: net.educause.edu

                  - Date: 2015-09-10 10:51:36
                    40Comprehensive and practical guidance for optimizing your IT security program Microsoft Services  Microsoft Security Risk Assessment

                    Comprehensive and practical guidance for optimizing your IT security program Microsoft Services Microsoft Security Risk Assessment

                    Add to Reading List

                    Source URL: download.microsoft.com

                    - Date: 2015-05-18 14:55:06