Information security management system

Results: 3115



#Item
761Auditing / Management / Environmental economics / Data security / ISO 14000 / ISO/IEC 27001 / Information security / Management system / Corrective and preventive action / Quality / Business / Evaluation

Qudos Management Pty. Ltd. Quality | Health & Safety | Environmental management 320 Adelaide Street, Brisbane, QLD 4000 Tel: + 3 Spring Street, Sydney, NSW 2000 Tel: +

Add to Reading List

Source URL: www.qudos-software.com

Language: English - Date: 2015-03-05 02:14:59
762Information systems / Computer security / Chief information officer / Tiasnimbas / Chief information security officer / Information security management system / Information security / Tilburg University / Corporate governance of information technology / Data security / Management / Security

an CIO Association Masterclass Cycle on Information

Add to Reading List

Source URL: www.aicanet.it

Language: English - Date: 2014-12-18 05:39:43
763Computing / National Cyber Security Division / Information security / Penetration test / Computer security / Security / Federal Information Security Management Act

Information System Security Line of Business Presented by: Michael C. Smith Department of Homeland

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:55:06
764Downtime / Database security / Information technology / Project management / Knowledge / System administration / Patch / Software maintenance

Virtual Patching and Database Security: An Effective Compensating Control Patching promptly is part of highly effective approaches to managing vulnerabilities, but patching is not always practical or even possible — wh

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:00
765Downtime / Database security / Information technology / Project management / Knowledge / System administration / Patch / Software maintenance

Virtual Patching and Database Security: An Effective Compensating Control Patching promptly is part of highly effective approaches to managing vulnerabilities, but patching is not always practical or even possible — wh

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:00
766Business / Quality / Data security / Counterfeit medications / ISO / Information security management system / Certification / Management / Evaluation / Business software / Sproxil

Protecting Brands Globally™ FOR IMMEDIATE RELEASE Sproxil Earns International Standards for Quality Management and ISMS Certifications Completes ISO27001 and ISO9001 International Standard Requirements

Add to Reading List

Source URL: www.sproxil.com

Language: English - Date: 2014-10-22 10:01:22
767Identity management / Access control / Single sign-on / Password / Identity management system / Password fatigue / Privileged password management / Federated identity / Computer security / Security

NSW Identity Hub (ID-Hub) Providing secure, single sign-on The NSW Identity Hub (ID-Hub) simplifies access to ICT systems by enabling a single login for all systems and information. An Identity Hub to serve

Add to Reading List

Source URL: www.govdc.nsw.gov.au

Language: English - Date: 2014-11-25 23:33:19
768Risk / Disaster preparedness / Security / Actuarial science / Humanitarian aid / Disaster / Social vulnerability / Geographic information system / South Pacific Applied Geoscience Commission / Management / Public safety / Emergency management

An information infrastructure for disaster management in Pacific island countries Introduction There is nothing more certain in the disaster management business than the fact that once a disaster starts to unfold, it

Add to Reading List

Source URL: www.em.gov.au

Language: English - Date: 2014-09-24 04:08:10
769Cyberwarfare / Crime prevention / National security / Information security / Security controls / Security risk / Vulnerability / Information security management system / Federal Information Security Management Act / Security / Computer security / Data security

Maintaining the Integrity and Confidentiality of Personal Information Audit summary Background The public sector is a complex business. In its normal, day-to-day activity it legitimately gathers and uses personal informa

Add to Reading List

Source URL: www.audit.vic.gov.au

Language: English - Date: 2013-07-11 19:57:49
770Information technology management / Computer network security / Computer security / Warning systems / System administration / HP Network Management Center / Software / Network management / Computing

Sunday, May 18, 2014 NetENV Releases NetVidi Professional Denver, CO — NetENV LLC., a leading provider of network management tools, has released the Professional version of its NetVidi network management, monitoring a

Add to Reading List

Source URL: downloads.netenv.com

Language: English - Date: 2014-05-19 19:26:09
UPDATE