Information technology controls

Results: 1397



#Item
81Data security / Computing / Public safety / NIST Special Publication 800-53 / Federal Information Security Management Act / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Information security / Security risk / Computer security / Security / National Institute of Standards and Technology

NIST Special PublicationRevision 1 Recommended Security Controls for Federal Information Systems Ron Ross

Add to Reading List

Source URL: www.infogard.com

Language: English - Date: 2011-10-13 13:47:31
82ISO/IEC 27001 lead auditor / ISO/IEC 27001 / Information security management system / BS / Security / Security controls / ISO/IEC 27003 / ISO/IEC 27000-series / Data security / Computer security / Computing

Managing Business Risk through Best Information Security Management Standard INFORMATION SECURITY MANAGEMENT SYSTEM BUSINESS WORLD CHALLENGES ON INFORMATION SECURITY: Information Technology has become an indispensable e

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 11:05:50
83Spreadsheet / Treasury / Audit / Finance / Federal Reserve System / Business / Government / Collateral management / Information technology controls / Auditing / Internal control / Internal audit

PDF Document

Add to Reading List

Source URL: www.cpaaustralia.com.au

Language: English
84Computer security / Internet in Australia / Domain name system / International Space Station / .au / Information security management system / Security controls / Information security / Information technology controls / Spaceflight / Data security / Security

auDA PUBLISHED POLICY Policy Title: auDA INFORMATION SECURITY STANDARD (ISS) FOR ACCREDITED REGISTRARS Policy No: Publication Date: Status: Current

Add to Reading List

Source URL: auda.org.au

Language: English - Date: 2014-09-01 22:09:50
85National Institute of Standards and Technology / Computing / NIST Special Publication 800-53 / Federal Information Security Management Act / Risk management framework / Information security management system / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Information security / Computer security / Data security / Security

NIST Special Publication 800-53A Guide for Assessing the Security Controls in Federal Information Systems Building Effective Security Assessment Plans

Add to Reading List

Source URL: www.infogard.com

Language: English - Date: 2011-10-18 16:33:14
86Public safety / Crime prevention / Information security / National security / Prevention / Business requirements / Computer security / Data security / Security

Objective Put security controls into the hands of the systems specialists. System Specialists, and Project Manangers, know their technology needs and requirements the best. Hand the choices of individual security control

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 05:52:42
87Financial economics / Technology / Business intelligence / Decision theory / Management systems / Collateral management / Dodd–Frank Wall Street Reform and Consumer Protection Act / Report / Management information system / Business / Business software / Information technology management

Management Information Managing collateralised trading. Enabling regulatory compliance. With more complex business models, and ever more invasive regulators, the need to know that your systems and controls are in place,

Add to Reading List

Source URL: www.lombardrisk.com

Language: English - Date: 2015-03-06 05:25:09
88Business / Business intelligence / Data management / Intelligence / Collateral management / Dodd–Frank Wall Street Reform and Consumer Protection Act / Dashboard / Information technology / MIS AG / Business software / Financial economics / Information systems

Management Information Managing collateralised trading. Enabling regulatory compliance. With more complex business models, and ever more invasive regulators, the need to know that your systems and controls are in place,

Add to Reading List

Source URL: www.lombardrisk.com

Language: English - Date: 2015-03-06 05:49:06
89Military science / Technology / Security / International Traffic in Arms Regulations / Export / United States Munitions List / Dual-use technology / Computer security / Arms Export Control Act / Military technology / Identifiers / United States Department of Commerce

The Impact of Export Controls on the Domestic Aerospace Industry: An AIAA Information Paper Abstract Export Control policies originally designed to protect sensitive technologies and capabilities from adversarial regimes

Add to Reading List

Source URL: www.aiaa.org

Language: English - Date: 2011-12-15 15:02:18
90Business / Administration / Records management / Accountability / Backup / Medical record / Archive / File archiver / Government / Public records / Content management systems / Information technology management

Records Management PURPOSE To ensure that records are established, maintained, that records remain legible, private, readily identifiable and retrievable, and to define the controls for identification, storage, protectio

Add to Reading List

Source URL: www.madec.edu.au

Language: English - Date: 2014-09-11 00:43:48
UPDATE