Security information management

Results: 13712



#Item
271Computer security / Auditing / Data security / Security / Information technology management / Health Insurance Portability and Accountability Act / IT risk / Chief information security officer / Audit / Enterprise risk management / Information security / Information technology audit

Beyond HIPAA compliance: Aligning IT audit and information security to manage information risks Guidance for health care internal auditors and information security professionals Executive summary Table of contents Execut

Add to Reading List

Source URL: www.ahia.org

Language: English - Date: 2016-06-06 13:37:31
272Federal Emergency Management Agency / Emergency management / Community emergency response team / United States Department of Homeland Security / Disaster preparedness / Firefighting in the United States / Emergency Management Institute / Triage / Emergency Preparedness / Cert / Emergency service / CaliforniaVolunteers

FebruaryTraining is designed to cover the following: For more information about education and

Add to Reading List

Source URL: www.regionalinfo-alert.org

Language: English - Date: 2015-09-24 16:27:51
273Data management / Crime prevention / Cryptography / Information governance / National security / Information security / Computer security / Data steward / Information privacy / Data governance / Cloud computing security

Information Technology Procedures CCC Data Management Procedures – DCL3 Data Access Identifier: IT-PROC-AC-001

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2015-01-14 10:21:22
274Computer security / Data security / Computer network security / Cryptography / National security / Security controls / Information security / Vulnerability / Security management / Security / Database security / ISO/IEC JTC 1/SC 27

PDF Document

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:05
275Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / National Institute of Standards and Technology / Angela Orebaugh / Open Vulnerability and Assessment Language / Vulnerability / CVSS / Information Security Automation Program

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:14:41
276Data management / Computer security / Information technology management / Data governance / Information technology governance / Cloud computing security / Enterprise data management / Cloud storage / Cloud computing / Data quality / Data defined storage / Data-centric security

Enterprise Strategy Group | Getting to the bigger truth.™ White Paper Meeting Data Governance Requirements Starts with Data Visibility

Add to Reading List

Source URL: www.egnyte.com

Language: English - Date: 2016-06-07 21:04:42
277Cryptography / Crime prevention / Information governance / National security / Data management / Information security / Data steward / Database / Computer security

ENTERPRISE IT STANDARDS AND PROCEDURES DATA STEWARDSHIP STANDARDS Policy: Enterprise Data Stewardship Policy

Add to Reading List

Source URL: www.montana.edu

Language: English - Date: 2016-01-19 13:45:51
278Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / Certificate policy / Energy Sciences Network / Revocation list / Public key certificate / Information security

Procedures and guidelines for the Policy Management Authority of the ESnet PKI Version X.X - DRAFT

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2004-02-11 16:14:38
279Environmental management / Impact assessment / Philosophy of science / Data security / Public administration / Environmental impact assessment / Information security / Evidence-based policy / Welsh language / Regulatory Impact Analysis

Reducing Complexity and Adding Value: A Strategic Approach to Impact Assessment in the Welsh Government February 2016

Add to Reading List

Source URL: ppiw.org.uk

Language: English - Date: 2016-05-03 03:49:01
280Computer security / National security / Crime prevention / Cryptography / Information governance / Intel / Triage / Computer forensics / Computer security incident management / Information security / Security / Global Information Assurance Certification

Collecting and Hunting for Indications of Compromise with Gusto and Style! SANS Threat Hunting & IR Summit – New Orleans, April 12, 2016 Ismael Valenzuela, GSE #132

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-04-15 13:43:25
UPDATE