Information security management

Results: 13712



#Item
21Auditor Information Security Passion for Quality and Safety! The team Business Assurance focuses on auditing management systems for various businesses and markets. Auditing is done for example against international stand

Auditor Information Security Passion for Quality and Safety! The team Business Assurance focuses on auditing management systems for various businesses and markets. Auditing is done for example against international stand

Add to Reading List

Source URL: werkenbijdekra.nl

- Date: 2016-09-01 08:33:10
    22Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: Organización Nacional De Ciegos Españoles (O.N.C.E.)

    Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: Organización Nacional De Ciegos Españoles (O.N.C.E.)

    Add to Reading List

    Source URL: www1.juegosonce.es

    - Date: 2015-10-06 04:11:39
      23Information Security Management System  一般財団法人 日本情報経済社会推進協会 参事 高取 敏夫 2016年4月26日 http://www.isms.jipdec.or.jp/

      Information Security Management System 一般財団法人 日本情報経済社会推進協会 参事 高取 敏夫 2016年4月26日 http://www.isms.jipdec.or.jp/

      Add to Reading List

      Source URL: www.isms.jipdec.or.jp

      - Date: 2016-05-27 00:12:06
        24T E TO N C O U N T Y A D MI N I S TR A TI V E P O L I C I E S  Password Management See also “Computers, Technology & Information Security Policy”  Revision:

        T E TO N C O U N T Y A D MI N I S TR A TI V E P O L I C I E S Password Management See also “Computers, Technology & Information Security Policy” Revision:

        Add to Reading List

        Source URL: tetoncountyidaho.gov

        - Date: 2015-12-04 12:26:03
          25Don’t neglect information security in the office automation environment Adding user authentication and user privilege management controls into document output environments

          Don’t neglect information security in the office automation environment Adding user authentication and user privilege management controls into document output environments

          Add to Reading List

          Source URL: www.itecgroup.co.za

          - Date: 2016-04-04 11:13:06
            26

            Security Information Management System (SIMS) The Security Information Management System provides a dynamic overview of LandWarNet security, tailored for the viewing user/organization. Filters and aggregates reporting

            Add to Reading List

            Source URL: netcom.army.mil

            - Date: 2009-10-26 18:29:50
              27ITL BULLETIN FOR JULY 2016 IMPROVING SECURITY AND SOFTWARE MANAGEMENT THROUGH THE USE OF SWID TAGS David Waltermire, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

              ITL BULLETIN FOR JULY 2016 IMPROVING SECURITY AND SOFTWARE MANAGEMENT THROUGH THE USE OF SWID TAGS David Waltermire, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2016-08-23 14:55:14
                28Accessing Secured Emails  To ensure the security of confidential information, Ohio Shared Services (OSS), a division of the Ohio Office of Budget Management, adheres to the state’s guidelines. This extends to communica

                Accessing Secured Emails To ensure the security of confidential information, Ohio Shared Services (OSS), a division of the Ohio Office of Budget Management, adheres to the state’s guidelines. This extends to communica

                Add to Reading List

                Source URL: ohiosharedservices.ohio.gov

                - Date: 2015-12-08 17:41:30
                  29Table of Contents 1. Purpose of Collection and Use of Personal Information 2. Range of Personal Information 3. Maintenance and Disuse of Personal Information 4. Range of Cookie Use 5. Security Management for Personal inf

                  Table of Contents 1. Purpose of Collection and Use of Personal Information 2. Range of Personal Information 3. Maintenance and Disuse of Personal Information 4. Range of Cookie Use 5. Security Management for Personal inf

                  Add to Reading List

                  Source URL: aprasc2016.org

                  - Date: 2016-04-12 12:50:32
                    30ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved

                    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved

                    Add to Reading List

                    Source URL: its.truman.edu

                    - Date: 2015-09-04 15:23:09