Information security governance

Results: 1058



#Item
241Cryptography / Data quality / Crime prevention / Information governance / National security / Data integrity / Key size / Computer security / Requirement / NIST Special Publication 800-53

Comments Received Final Draft of Special Publication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-10-30 12:22:04
242Data security / Crime prevention / Cryptography / Information governance / National security / Information security / BSI Group / Professional certification / DocuSign / Computer security / ISO/IEC 20000 / ISO/IEC 27001:2005

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: DocuSign, IncSecond Ave, Suite 2000

Add to Reading List

Source URL: www.docusign.jp

Language: English - Date: 2015-05-29 02:09:07
243

ICT Acceptable Use Policy (AUP) Version Number: 4.1 Effective from 17 December 2015 Author: Senior Information Security Officer & Head of Information Governance

Add to Reading List

Source URL: www.salford.ac.uk

Language: English - Date: 2015-12-16 09:32:57
    244Crime prevention / Cryptography / Information governance / National security / Security guard / Surveillance / Bank / Computer security / Patriot Act /  Title III

    The Banking and Financial Institutions (Physical Security Measures) Regulations, 2014 G.N. No. 291 GOVERNMENT NOTICE NO 291 published on

    Add to Reading List

    Source URL: www.bot.go.tz

    Language: English - Date: 2015-04-24 08:14:49
    245Information technology management / Computing / Security / Data security / Crime prevention / Cryptography / Information governance / National security / SolarWinds / Security information and event management / Information security / Computer security

    c a s e stu dy LegacyTexas Bank LegacyTexas Bank is a full-service community bank serving businesses and families

    Add to Reading List

    Source URL: solarwinds-marketing.s3.amazonaws.com

    Language: English - Date: 2011-11-07 16:07:35
    246

    2016 ISACA Certification Boot Camps Earn the ISACA Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk a

    Add to Reading List

    Source URL: www.isaca.org

    Language: English - Date: 2016-04-06 23:50:48
      247Security / Prevention / Data security / Safety / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Risk / Data breach

      Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls Stefan Laube Rainer Böhme

      Add to Reading List

      Source URL: informationsecurity.uibk.ac.at

      Language: English - Date: 2016-04-12 07:21:29
      248Security / Prevention / Safety / Crime prevention / Cryptography / National security / Information governance / Public safety / Computer security / Security guard

      Case Study: Global Security Services “We easily have saved at least 5 hours a week on just B*!!S#*! and paperwork. Like filing and looking up customers. We have really customized the fields that are customizable so ev

      Add to Reading List

      Source URL: www.hindsitesoftware.com

      Language: English - Date: 2012-04-23 11:46:18
      249Computing / Prevention / Security / Cryptography / Crime prevention / Information governance / National security / Cloud computing / Data center / Information security / Risk management / Business continuity

      Guidelines | Technical Infrastructure hosting Gaming and Control Systems Remote Gaming December 2015

      Add to Reading List

      Source URL: www.mga.org.mt

      Language: English - Date: 2015-12-17 04:12:52
      250Computing / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Enterprise application integration / SOA Security / Decentralization / Software as a service / Cloud computing

      Issue LXI • AprilReducing Application Cost and Risk through Centralized SOA Security by Mamoon Yunus, CEO of Crosscheck Networks

      Add to Reading List

      Source URL: servicetechmag.com

      Language: English - Date: 2012-04-24 20:38:15
      UPDATE