Information security audit

Results: 2404



#Item
271Computing / Professional certification / Information Technology Infrastructure Library / Certified Business Continuity Professional / Certification / Certified Information Security Manager / Information technology audit / Information Systems Audit and Control Association / (ISC)² / Standards / Evaluation / Education

8th Annual Business Continuity Compensation Report Asia Pacific — April, 2009 Average Total Compensation by Region - FTE Region

Add to Reading List

Source URL: www.bcmanagement.com

Language: English - Date: 2010-03-15 08:50:55
272Information technology management / Risk / Information technology audit / Information technology governance / COBIT / Corporate governance of information technology / IT risk management / Information Systems Audit and Control Association / Information assurance / Computer security / Data security / Security

A NEW ERA September London, England EuroCACS/ISRM CONFERENCEA NEW EDGE

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2013-07-16 19:00:09
273Data security / Accountancy / Risk / Security / Certified Information Systems Auditor / Information Systems Audit and Control Association / Corporate governance of information technology / Audit / CISA / Information technology audit / Auditing / Information technology management

AFRICAN ADVANCED LEVEL TELECOMMUNICATIONS INSTITUTE (AFRALTI) TRAINING COURSE INFORMATION Course Dates: 5th July to 30th August 2014 CISA Exam Date & Location: 6th September 2014 Exam at EASA, Embakasi

Add to Reading List

Source URL: www.afralti.org

Language: English - Date: 2015-01-16 02:59:39
274Intel / Information technology controls / Computer hardware / Electronics / Computer security / Host Based Security System / McAfee VirusScan / McAfee / Computing / Companies listed on the New York Stock Exchange

Data Sheet McAfee Configuration Control Audit, control, and enforce for continuous compliance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-15 15:26:19
275Auditing / Security / Information technology audit / Standards / Software testing / Penetration test / Information Systems Audit and Control Association / Certified Information Security Manager / Information security management / Computer security / Data security / Computing

CESG Certified Professional Scheme – qualification requirements For practitioner applications we require proof of a relevant information assurance certification. A copy of your certificate must be provided along with y

Add to Reading List

Source URL: certifications.bcs.org

Language: English - Date: 2014-10-01 04:18:04
276Business / Actuarial science / Risk management / Security / Internal audit / Internal control / Information security management system / Audit committee / Africa Rice Center / Auditing / Risk / Management

Microsoft Word - Approved Risk management Policy

Add to Reading List

Source URL: africarice.org

Language: English - Date: 2014-10-07 08:55:42
277Security / Computer security / Data security / Administration / Information security / Digital continuity / Records management / Risk / Information audit / Information technology management / Management / Business

A review of lessons learned from the IMA programme, 2008–14 Published: March 2015 t

Add to Reading List

Source URL: www.nationalarchives.gov.uk

Language: English - Date: 2015-03-17 11:53:39
278Information technology audit / Risk / Data security / Audit / Information security / Internal audit / Cloud computing / Internet privacy / Information security audit / Auditing / Accountancy / Security

Audimation - Shadow White text

Add to Reading List

Source URL: www.audimation.com

Language: English - Date: 2015-02-26 08:39:42
279Auditing / Management / Project management / Risk management / Audit / TRAC / Assurance services / Prevention / Security / Business / Actuarial science

Case Study: Commercial Loan Document Firm Must Provide Security Assurance to Large Customers (Document NoSolutions For Advanced IT Services Altius Information Technologies, Inc.

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:38
280Computer law / Government / Computer security / Data Protection Act / Audit Commission / Identity Cards Act / Information privacy / Privacy / Internet privacy / Ethics / Privacy law / Data privacy

NO2ID Parliamentary Briefing on the UK Borders Bill

Add to Reading List

Source URL: www.no2id.net

Language: English - Date: 2013-12-22 20:29:06
UPDATE