Information security governance

Results: 1058



#Item
271Security / Prevention / National security / Safety / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Information security / Privacy / Medical privacy

Thank you for the opportunuty to submit evidence to inform the Royal Society’s Cybersecurity research project. I am writing today on my own behalf to draw attention to an easily overlooked set of problems in cybersecu

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 12:06:03
272Security / Technology / Information governance / Cryptography / National security / Editing / Redaction / Internet / Computer security

State of Wisconsin Department of Administration Division of intergovernmental Relations DOARSd) WIS Stats

Add to Reading List

Source URL: doa.wi.gov

Language: English - Date: 2012-11-29 14:25:04
273Security / Prevention / Computing / Computer network security / Crime prevention / Cryptography / Information governance / National security / Virtual private network / ResNet / Information security / Computer security

INFORMATION TECHNOLOGY SERVICES Effective Date: May 5, 2015 Date Revised: May 5, 2015

Add to Reading List

Source URL: www.northeastern.edu

Language: English - Date: 2016-03-03 11:47:10
274Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Computer security / Internet privacy / Information security / Cloud storage

  Box  Acceptable  Use  Policy  at  the  University  of  Utah       Box.com is cloud storage that provides users with the ability to easily store, access and share

Add to Reading List

Source URL: it.utah.edu

Language: English - Date: 2015-03-06 09:55:04
275

Public Sector Consulting Information Security consultancy designed to specifically address the governance and regulatory needs of the public sector Cloud computing, online platforms and mobility solutions are shaping the

Add to Reading List

Source URL: www.senseofsecurity.com.au

Language: English - Date: 2015-01-12 00:59:37
    276Management / Systems thinking / Chief digital officer / Corporate governance / Chief information officer / Mortgage-backed security / Corporate title / Digital strategy / Digital marketing / Chief data officer / Technological convergence / Strategic management

    The rise of the Chief Digital Officer Key considerations for driving digital growth from the C-suite CEO

    Add to Reading List

    Source URL: www.deloittedigital.ca

    Language: English - Date: 2015-05-26 11:49:13
    277Information technology management / Content management systems / Administration / Public records / Information governance / Records management / Electronic discovery / Legal hold / Enterprise content management / Information security / Compliance and ethics program / Regulatory compliance

    White Paper The Information Governance “C” Change Swamped by overflowing data and buffeted by e-discovery costs and information security requirements, companies are now compelled to make information management a

    Add to Reading List

    Source URL: www.huschblackwell.com

    Language: English - Date: 2016-01-07 13:02:51
    278Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Information technology management / Business process management / Information security / Computer security

    Making Information Security a “business forward discipline” Information Security Strategy & Leadership Current State of Affairs

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2010-08-17 20:39:46
    279Computing / Software / Security / Crime prevention / Cryptography / Information governance / National security / Mobile software / BlackBerry / Exchange ActiveSync / ActiveSync / Mobile computing

    Mobile Device Security Standard Syracuse University – Information Technology and Services Information Security Standard – S0103 1.0 Scope

    Add to Reading List

    Source URL: its.syr.edu

    Language: English - Date: 2016-03-02 04:52:29
    280Security / Prevention / E-commerce / Crime prevention / Cryptography / Information governance / National security / Family Educational Rights and Privacy Act / Privacy / Debits and credits / Computer security / Personally identifiable information

    AUTHORIZATION TO RELEASE FINANCIAL INFORMATION The privacy of personal information of a student, 18 years of age or older, or a student under age 18 attending a post-secondary education institution, is protected under FE

    Add to Reading List

    Source URL: sites.uci.edu

    Language: English - Date: 2014-10-17 20:28:42
    UPDATE