Information security audit

Results: 2404



#Item
461National security / Crime prevention / Computer network security / Information security / Security controls / Infrastructure / Information technology audit / Critical infrastructure / Vulnerability / Security / Data security / Computer security

RTF Document

Add to Reading List

Source URL: www.audit.vic.gov.au

Language: English - Date: 2013-07-11 21:27:50
462Internal control / Internal audit / Business continuity / Audit / Project management / UK Academy for Information Systems / Information security / Auditing / Business / Change management

MAINTAINING THE STANDARD OF FINANCIAL MANAGEMENT DURING ORGANISATIONAL CHANGE B.29[99e] Introduction[removed]Earlier this year we wrote about maintaining financial

Add to Reading List

Source URL: www.oag.govt.nz

Language: English - Date: 2014-04-29 00:45:24
463Security / Business / Regulatory compliance / Internal audit / Information security management system / Compliance and ethics program / Governance /  risk management /  and compliance / Auditing / Risk / Data security

National Occupational Standards Compliance NOTES ABOUT NATIONAL OCCUPATIONAL STANDARDS What are National Occupational Standards, and why should you use them?

Add to Reading List

Source URL: www.int-comp.org

Language: English - Date: 2014-11-28 05:04:16
464Business / Actuarial science / Security / Risk management / Committee of Sponsoring Organizations of the Treadway Commission / Audit committee / Operational risk / Internal control / Information security management system / Management / Risk / Auditing

Managing risk across the public sector

Add to Reading List

Source URL: www.audit.vic.gov.au

Language: English - Date: 2013-07-09 19:39:41
465National security / Information technology audit / Security controls / Information security / SCADA / Infrastructure / Audit / ISO/IEC 27002 / Vulnerability / Security / Data security / Computer security

Microsoft Word - Back pages.doc

Add to Reading List

Source URL: www.audit.vic.gov.au

Language: English - Date: 2013-07-11 21:27:35
466Computer security / Data security / Evaluation methods / Sociology / Internal control / Information technology controls / Information security / Internal audit / Empowerment evaluation / Auditing / Security / Evaluation

Agenda Joint Universities Computer p Centre Limited (“JUCC”)

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-09-26 02:29:27
467Data security / Risk / Nuclear Knowledge Management / Nuclear technology / Information technology audit / Auditing / Human resource management

Job Profile – General Secretary (GS), Commission Internationale de l’Eclairage (CIE) Job Purpose The General Secretary is responsible for the successful leadership and management of the organization according to the

Add to Reading List

Source URL: files.cie.co.at

Language: English
468Information technology audit / Computing / Security / Privileged Identity Management / Database activity monitoring / Computer security / Privilege / Principle of least privilege

Avecto | Solution Brief Solution Brief for Servers Privilege Guard Features: Due to the power that privileged accounts carry,

Add to Reading List

Source URL: www.axial.co.uk

Language: English - Date: 2013-08-02 09:17:06
469Imperva / Computer security / Computer forensics / Information technology audit

Microsoft Word - PR-4-08 SC 2008 Winner.doc

Add to Reading List

Source URL: www.wetstonetech.com

Language: English - Date: 2010-09-02 14:45:15
470Internal audit / Information technology audit / Audit / Finance / Internal control / Health Insurance Portability and Accountability Act / Information technology security audit / Information technology controls / Information technology audit process / Auditing / Risk / Business

Microsoft Word[removed]Department of Corrections - PAFU Operational.docx

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2015-01-26 07:12:41
UPDATE