Information security governance

Results: 1058



#Item
221Data security / Crime prevention / Cryptography / Information governance / National security / Regulatory compliance / Audit / Computer security / Internal audit / Business process management / Vulnerability / Security information and event management

A FORESITE WHITE PAPER THE ART AND SCIENCE OF COMPLIANCE INTRODUCTION Today, regulatory and legislative compliance obligations seem endless and ever-changing. Corporations are faced with enormous challenges

Add to Reading List

Source URL: foresite.com

Language: English - Date: 2016-02-17 15:35:27
222Crime prevention / Cryptography / Information governance / National security / Security guard / Surveillance / Computer security / Email

How to Manage ePermitting Security

Add to Reading List

Source URL: apps.dep.wv.gov

Language: English - Date: 2014-04-22 11:10:39
223Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Application firewall / Information security / Web application firewall / Michigan State University / SQL injection / Vulnerability

CASE STUDY Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-02 12:16:23
224Crime prevention / Cryptography / Information governance / National security / Data security / Internet privacy / EIDAS / Privacy / Information security / Computer security / Facebook / Internet security

EEMA online January 2016 Issue 2 Diary dates 2016 Below are some of the events that we are holding next year. Be sure to bookmark them now! For further information visit www.eema.org/events. 23 February

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
225Crime prevention / Cryptography / Information governance / National security / Financial regulation / Money laundering / Information security / Political corruption / Educational technology / Corruption / Computer security

e-Learning ProgrammeCOMPLIANCE LIBRARY 60-MINUTE

Add to Reading List

Source URL: www.factors.org.uk

Language: English - Date: 2016-01-25 07:01:36
226Security / Computing / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Vulnerability / Application security / Software development process / Software development

The Days Before Zero Day: Investment Models for Secure Software Engineering Chad Heitzenrater∗‡ Rainer B¨ohme†

Add to Reading List

Source URL: weis2016.econinfosec.org

Language: English - Date: 2016-05-18 13:31:12
227Crime prevention / National security / Cryptography / Information governance / Cybercrime / Computer security / Security / Information security / Bring your own device / Mobile security

Cover Sheet Table of Contents Introduction

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-04-01 16:27:16
228Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Information security / Computer security / Usability / Vulnerability / Paul Dourish

International Journal of Human Computer Studies Special Issue on HCI Research in Privacy and Security, 63(1-2), In the Eye of the Beholder: A Visualization-based Approach to Information System Security Rogér

Add to Reading List

Source URL: www.dourish.com

Language: English - Date: 2008-06-14 12:49:25
229Security engineering / Security / Computing / Associated Locksmiths of America / Locksmithing / Crime prevention / Cryptography / Information governance / National security / Email / Computer security

Help SAVTA Reach New Heights in 2016 — and Win! We’re always looking for ways to improve your association. From adding member benefits to new classes, we work hard to give you the best value. But now we

Add to Reading List

Source URL: www.savta.org

Language: English - Date: 2016-03-01 16:34:44
230Auditing / Actuarial science / Information governance / Management / Security / Enterprise risk management / Corporate governance / Audit / Information security / Internal control / Management system / Risk management

63 PIDM Annual Report 2015 Section

Add to Reading List

Source URL: www.pidm.gov.my

Language: English - Date: 2016-04-25 15:55:36
UPDATE