Information security audit

Results: 2404



#Item
991Information technology audit / Auditing / Data security / Management / Office management / Spreadsheet

CLUSTER Business and Marketing COURSE Office Management WVEIS CODE BM1449

Add to Reading List

Source URL: careertech.k12.wv.us

Language: English - Date: 2013-06-05 11:23:59
992Contract law / Service-level agreement / Information technology audit / Business / Management / Internal audit / Audit / Risk / ITIL security management / Information technology management / Auditing / Outsourcing

Audit of Service Level Agreements for the House of Commons Final Audit Report Office of Audit and Evaluation

Add to Reading List

Source URL: ssc-spc.gc.ca

Language: English - Date: 2014-09-12 09:19:17
993Computer security / Risk / Information technology audit / Information technology management / Information security / Information technology controls / Internal audit / Security controls / IT risk / Data security / Security / Auditing

Microsoft Word[removed]DOT PCM.docx

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2014-11-14 07:04:25
994Computer security / Actuarial science / Risk management / Data security / Enterprise risk management / IT risk / Security risk / Information technology audit / Security controls / Risk / Management / Security

Microsoft Word - 201420092fr.docx

Add to Reading List

Source URL: www.treasury.gov

Language: English - Date: 2014-11-06 10:03:30
995Business / Applied ethics / Corporate governance / Codes of conduct / Information security / Business ethics / Audit committee / Internal control / Regulatory compliance / Auditing / Ethics / Corporations law

Citizens Financial Group, Inc. Code of Business Conduct and Ethics To: All Citizens Financial Group Employees, Officers and Directors Our industry is one of the most heavily regulated in the United States. Yet, we know

Add to Reading List

Source URL: www.charterone.com

Language: English - Date: 2014-09-16 09:02:26
996National security / Computer network security / Information technology audit / Cyberwarfare / Password / Audit trail / Operating system / Logical security / Information technology audit process / Security / Computer security / Crime prevention

Revised[removed]CHAPTER 8 INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION

Add to Reading List

Source URL: www.in.gov

Language: English - Date: 2015-01-08 16:50:01
997Public safety / Information technology audit / Government / Risk / Corporate governance / Auditing / United States Department of Homeland Security / Audit

State of Washington Status of Audit Resolution December 2014

Add to Reading List

Source URL: www.ofm.wa.gov

Language: English - Date: 2014-12-22 16:36:04
998National security / Computer network security / Computer security / Password / Information technology audit / Operating system / Audit trail / Application software / Document management system / Security / Information technology management / Crime prevention

PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS

Add to Reading List

Source URL: www.in.gov

Language: English - Date: 2015-01-08 16:48:52
999Cyberwarfare / Data security / Wireless networking / Wireless security / Information security / Network security / Audit / National Archives and Records Administration / Wireless / Security / Computer network security / Computer security

Cotton & Company’s Audit of NARA’s Enterprise Wireless Access

Add to Reading List

Source URL: www.archives.gov

Language: English - Date: 2014-12-23 13:25:08
1000Password / Information technology audit / Data security / Native American gaming / Native American history / United States law

NATIONAL INDIAN GAMING COMMISSION MICS AUDIT CHECKLIST # MICS QUESTION

Add to Reading List

Source URL: egghart.com

Language: English - Date: 2013-11-15 04:58:32
UPDATE