Information security audit

Results: 2404



#Item
181Business law / Data security / Information security management system / Human resource management / Financial audit / Business ethics / Overtime / Business / Labour relations / Auditing

Assessment Questions NOVEMBER 2013 RJC TOOLKITS

Add to Reading List

Source URL: www.responsiblejewellery.com

Language: English - Date: 2014-03-24 11:47:14
182Audit / Information security / Public safety / Audit committee / Information technology audit process / Auditing / Security / Risk

JOB DESCRIPTION & PERSON SPECIFICATION JOB TITLE: Communications Audit Team Manager DEPARTMENT:

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2015-05-01 10:53:11
183Data / Digital forensics / Data security / Computer forensics / Information technology audit / Backup / Forensic science / Data recovery / Electronic discovery / Email / Computing / Information

PDF Document

Add to Reading List

Source URL: www.consilio.com

Language: English - Date: 2013-12-23 15:41:01
184Risk / Business / Audit / Internal audit / Internal control / Information security / Business continuity / Information technology audit process / Computer-aided audit tools / Auditing / Accountancy / Information technology audit

JD - Officer IS Audit _1_

Add to Reading List

Source URL: www.abcthebank.com

Language: English - Date: 2015-05-08 02:38:00
185Information technology audit / Data security / Computer security / Strategic management / Training package / Audit

PDF Document

Add to Reading List

Source URL: www.theservicetradescollege.com.au

Language: English - Date: 2015-04-27 19:11:58
186Risk / Security / Common Security and Defence Policy missions of the European Union / Common Security and Defence Policy / Audit / Certified Information Systems Auditor / Internal audit / Institute of Internal Auditors / Security guard / Auditing / Accountancy / Information technology audit

EUROPEAN EXTERNAL ACTION SERVICE Annex 1 European Union Police Mission in Afghanistan (EUPOL AfghanistanExtraordinary Call for Contributions

Add to Reading List

Source URL: www.eeas.europa.eu

Language: English - Date: 2015-05-05 06:52:52
187Business / Document management system / Information security / Enterprise content management / Records management / Audit / Information Lifecycle Management / Perceptive Software / Beyondoc / Information technology management / Content management systems / Project management

Interim_LEX_Primary_Logo_Large_NEW-CMYK

Add to Reading List

Source URL: perceptivesoftware.com

Language: English - Date: 2015-05-18 07:41:47
188Crime prevention / Data security / Information security / National security / Internal audit / Public safety / Business / Dodd–Frank Wall Street Reform and Consumer Protection Act / Auditing / Security / Computer security

2004:2; Regulations Governing Investment Funds

Add to Reading List

Source URL: finansinspektionen.se

Language: English - Date: 2010-09-01 03:15:54
189Business / Security / Information security / SOX 404 top–down risk assessment / Auditing / Internal audit / Risk

2015 State of IT Changes Survey Regardless the size 70% of IT teams make undocumented changes and put their systems at risk of security breaches

Add to Reading List

Source URL: www.netwrix.com

Language: English - Date: 2015-04-21 16:46:42
190Computer security / Risk / Information technology audit / Information security / Public safety / Information technology audit process / Certified Information Systems Auditor / Auditing / Data security / Security

JOB DESCRIPTION & PERSON SPECIFICATION JOB TITLE: Lead Auditor DEPARTMENT:

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2015-04-20 07:16:07
UPDATE