Information technology controls

Results: 1397



#Item
291Computing / SCADA / Control system security / Industrial control system / Federal Information Security Management Act / Information security / Security controls / ICS / Risk management framework / Computer security / Technology / Security

(Second and Final) DRAFT Special Publication[removed]Revision 2, Guide to Industrial Control Systems (ICS) Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-09 09:58:03
292Computer security / Data security / Actuarial science / Risk analysis / Basel II / IT risk management / Information technology controls / Systemic risk / Risk management / Risk / Security / Management

Independent Data Professionals Group – Response to Principles for effective risk data aggregation and risk reporting - consultative document, June 2012 Independent Data Professionals Group Nicola Askham

Add to Reading List

Source URL: www.bis.org

Language: English - Date: 2012-12-17 08:33:00
293Ethics / Security / Emergency management / Operational risk / Liquidity risk / Credit risk / Minimum capital requirement / Information technology controls / Basel II / Actuarial science / Management / Risk

ASSET MANAGEMENT CAPITAL REQUIREMENTS DIRECTIVE PILLAR 3 DISCLOSURES PERIOD ENDING 31ST DECEMBER 2013

Add to Reading List

Source URL: www.rlam.co.uk

Language: English - Date: 2014-10-14 11:40:11
294Finance / Actuarial science / Financial services / Operational risk / Minimum capital requirement / Liquidity risk / Investment management / Collateral management / Information technology controls / Financial economics / Risk / Financial risk

ASSET MANAGEMENT CAPITAL REQUIREMENTS DIRECTIVE PILLAR 3 DISCLOSURES PERIOD ENDING 31ST DECEMBER 2013

Add to Reading List

Source URL: www.rlam.co.uk

Language: English - Date: 2014-10-14 11:42:03
295Audit / Assurance services / Corporate social responsibility / Finance / Ethics / Information technology audit process / Entity-level controls / Auditing / Business / Internal control

Independent Limited Assurance Report to the Directors of Lloyds Banking Group plc The Directors of Lloyds Banking Group plc (“LBG”) engaged us to provide limited assurance on the information described below and

Add to Reading List

Source URL: www.lloydsbankinggroup-cr.com

Language: English - Date: 2014-04-10 11:27:09
296Information technology controls / privacy / Intellectual property law

Statement of Understanding1 on * Intangible Transfers of Software and Technology (Agreed at 2001 Plenary)

Add to Reading List

Source URL: www.wassenaar.org

Language: English - Date: 2013-10-14 10:26:08
297Public safety / Management / Risk analysis / Information Risk Management / Security controls / Information security / IT risk / Corporate governance of information technology / Risk management / Security / Computer security / Data security

India | 11 Information Security Governance: What, How & Why of

Add to Reading List

Source URL: www.intosaiitaudit.org

Language: English - Date: 2013-01-31 00:41:56
298National security / Data security / Crime prevention / Computer network security / Information security / Vulnerability / Security controls / Chief information security officer / Advanced persistent threat / Security / Computer security / Cyberwarfare

The SANS Technology Institute Contact Stephen Northcutt FOR IMMEDIATE RELEASE January, 2012 Tel: ([removed]Email: [removed]

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:55
299Business / Audit / Materiality / Internal audit / Comptroller and Auditor General / National Audit Office / Comptroller / Information technology controls / Auditing / Accountancy / Risk

Framework agreement between DH and PHE: Annex D

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2013-11-19 10:48:20
300Computing / Computer network security / Security controls / National Institute of Standards and Technology / Unemployment benefits / Information Technology Security Assessment / NIST Special Publication 800-53 / Federal Information Security Management Act / Computer security / Data security / Security

Microsoft Word - UIPL SEC[removed]Chg3.doc

Add to Reading List

Source URL: wdr.doleta.gov

Language: English - Date: 2009-03-06 15:02:05
UPDATE