Information security governance

Results: 1058



#Item
401Information technology audit / Corporate governance / Business / ISO/IEC 27001 lead auditor / Auditing / Audit / Accreditation

ACCREDITATION RULE 14 Issue Date: Implementation Date: Supersedes: Accreditation Rule 36, SUBJECT: Access by Auditors Being Denied on Security Grounds APPLIES TO: ANAB-Accredited and Appl

Add to Reading List

Source URL: www.aclasscorp.com

Language: English - Date: 2014-12-29 14:36:15
402Crime prevention / Data security / Information security / National security / Information governance / Question / Internet privacy / Amber / Information / Security / Business / Computer security

PROPORTIONATE REVIEW OF PRIVACY ADVISORY COMMITTEE QUESTIONNAIRE FOR ASSESSING APPLICATIONS: Document Control Version 1.1

Add to Reading List

Source URL: www.nhsnss.org

Language: English - Date: 2014-08-21 07:51:55
403Computer security / Standards / Computing / Security / Information Systems Audit and Control Association / Corporate governance of information technology / Certified Information Security Manager / CISA / Certified Information Systems Auditor / Data security / Auditing / Information technology audit

Welcome Remarks by Dr. Jabiri Kuwe Bakari, CEO – e-Government Agency and Vice President, ISACA Tanzania Chapter on the Occasion of Annual General Meeting, Held on January 21st , 2015 at Double Tree Hotel, Dar-es-Salaam

Add to Reading List

Source URL: www.ega.go.tz

Language: English - Date: 2015-01-21 04:25:54
404Computer security / Computing / Security / Information technology governance / Information technology management / Information Systems Audit and Control Association / COBIT / Corporate governance of information technology / Certified Information Systems Auditor / Information technology audit / Data security / Auditing

ISACA Intellectual Property Guidelines ISACA administers, maintains and enforces an intellectual property (IP) policy that is designed to facilitate dissemination of its copyrighted IP, while still protecting it. The pol

Add to Reading List

Source URL: www.isaca.sk

Language: English - Date: 2012-01-23 04:22:58
405Freedom of information legislation / India / Right to Information Act / Internet privacy / Identity document / Notary public / Privacy / Personally identifiable information / Information privacy / Ethics / Security / Law

QUEENSLAND UNIVERSITY OF TECHNOLOGY Application for Access to Information: Right to Information and Information Privacy Right to Information Act[removed]section 24) Information Privacy Act[removed]section 43) Please read the

Add to Reading List

Source URL: www.governance.qut.edu.au

Language: English - Date: 2014-07-09 19:46:46
406Computer security / Vulnerability / Cyberwarfare / Failure / Right to Information Act / Sensitive Security Information / Accountability / Freedom of information legislation / Corporate governance

DISCLOSURE SCOTLAND GUIDE TO INFORMATION AVAILABLE THROUGH OUR PUBLICATION SCHEME The Freedom of Information (Scotland) Act[removed]the Act) requires Scottish public authorities to produce and maintain a publication scheme

Add to Reading List

Source URL: www.disclosurescotland.co.uk

Language: English - Date: 2015-03-06 06:34:24
407Actuarial science / Management / Computer security / Information technology audit / Certified Information Security Manager / Information security / Risk management / Risk / Skills Framework for the Information Age / Data security / Security / Public safety

Course content Information Security takes you on a journey through governance, management of information, how to develop strategies, responses to incidents, and information risk management. It has been based on the Infor

Add to Reading List

Source URL: www.acs.org.au

Language: English - Date: 2015-01-19 23:28:03
408Government / Politics of the United States / Chief financial officer / Corporate governance / Single Audit / Federal Information Security Management Act / Chief Financial Officers Act / Chief information officer / Office of Management and Budget / United States Office of Management and Budget / United States administrative law / Management

GAO[removed], FEDERAL CHIEF INFORMATION OFFICERS: Reporting to OMB Can Be Improved by Further Streamlining and Better Focusing on Priorities

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-04-02 12:17:01
409Southeast Asia / Political philosophy / Sociology / Structure / Indonesia–European Union relations / European Union / Federalism / Association of Southeast Asian Nations

The European Union promotes safety and security in South-East Asia For more information see section about “Stable Situations” on: http://ec.europa.eu/europeaid/sectors/human-rights-and-governance/peace-and-security/f

Add to Reading List

Source URL: www.eeas.europa.eu

Language: English - Date: 2015-02-02 04:09:25
410Computer security / Accountancy / Data security / Information technology governance / COBIT / Information Systems Audit and Control Association / Information security management system / Vulnerability / Certified Information Systems Auditor / Auditing / Information technology audit / Information technology management

Conference Progam & Key Events[removed]August , 2015 Sheraton on the Park – Elizabeth Street, Sydney Sunday 9th August Conference Registration

Add to Reading List

Source URL: www.oceaniacacs2015.org

Language: English - Date: 2015-04-08 01:47:21
UPDATE