Information Technology Security Assessment

Results: 459



#Item
241Entity-level controls / Management accounting / Management / Security / Financial risk / Audit / Information technology audit / SOX 404 top–down risk assessment / Internal control / Auditing / Risk / Business

Microsoft Word - M3, Handout - TDRBA Diagram.doc

Add to Reading List

Source URL: www.ncosc.net

Language: English - Date: 2011-02-25 10:23:00
242Computing / Gaithersburg /  Maryland / National Institute of Standards and Technology / NIST Special Publication 800-53 / Security controls / Personally identifiable information / Computer security / Data security / Security

SUMMARY PRIVACY IMPACT ASSESSMENT (PIA) National Institute of Standards and Technology NIST Management Resources Systems Project Description The mission of NIST Management Resources is to support central financial operat

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2012-02-10 14:16:22
243Technology assessment / Management / Evaluation / Reliability engineering / Risk assessment / Safety engineering / Information Technology Security Assessment / Risk / Probability / Impact assessment

STC Research Project Description Project Title: Using ITS Data in Risk Assessment of Transportation Network Principal Investigator: Mei Chen University: University of Kentucky Telephone: [removed]Email Address: mchen

Add to Reading List

Source URL: stc.utk.edu

Language: English - Date: 2004-05-04 08:38:53
244National security / Software testing / Computer network security / United States Department of Homeland Security / Oak Ridge National Laboratory / Chemical Facility Anti-Terrorism Standards / Vulnerability / DHS Directorate for Science and Technology / Sensitive security information / Security / Computer security / Public safety

Microsoft Word - Chemical Security Assessment Tool.docx

Add to Reading List

Source URL: computing.ornl.gov

Language: English - Date: 2011-03-23 08:20:34
245Risk management / Security / Data security / Information Risk Management / Information technology management / Risk analysis / Risk / Management / Own Risk and Solvency Assessment

To: Commissioner Eleanor Kitzman (TX), Chair of Financial Regulation Standards and Accreditation (F) Committee From:

Add to Reading List

Source URL: www.insurance.naic.org

Language: English - Date: 2014-01-29 10:15:54
246Audit / Security / IT risk / Technology assessment / Information technology audit process / Privacy Act / Auditing / Risk / Computer security

DOC Document

Add to Reading List

Source URL: privacy.org.nz

Language: English - Date: 2014-09-24 22:15:05
247Pharmacology / Actuarial science / Risk management / Security / Information technology management / Pharmacovigilance / European Medicines Agency / Risk assessment / New Drug Application / Pharmaceutical sciences / Risk / Management

B i - a n n u a l n e w s l e t t e r f ro m P o p e Wo o d h e a d Edition 8 - Summer 2014 Benefit-risk analysis & reporting comes of age

Add to Reading List

Source URL: www.popewoodhead.com

Language: English - Date: 2014-07-16 09:24:23
248Ethics / Risk management / Actuarial science / Security / Risk assessment / Identifying and Managing Project Risk / Information technology audit process / Management / Risk / Project management

Project Name Here Abbreviated Risk Management Plan ___________________________________________________________________________________________

Add to Reading List

Source URL: epmo.vermont.gov

Language: English - Date: 2014-02-07 10:23:42
249Management / Ethics / Security / Risk management / Internal control / Audit / Materiality / SOX 404 top–down risk assessment / Information technology audit process / Auditing / Risk / Actuarial science

Focused Assessment Program SLIDE 1 This slide represents the cover and introduces the Focused Assessment as "A Risk Based Approach to Audit." It depicts the Office of Strategic Trade, Regulatory Audit Division as the pre

Add to Reading List

Source URL: www.cbp.gov

Language: English - Date: 2013-12-19 12:19:27
250Risk / Cyberwarfare / Computer network security / Penetration test / Vermont Energy Investment Corporation / Vulnerability / Mobile application development / Sitefinity / Social vulnerability / Software testing / Computing / Computer security

Enterprise Information Technology Security Assessment RFP Answers to Questions GENERAL QUESTIONS Q: How do the goals of the security assessment relate to improving the way VEIC does business? A: Security of our and our c

Add to Reading List

Source URL: veic.org

Language: English - Date: 2014-07-25 16:23:39
UPDATE