Security information management

Results: 13712



#Item
911Credit cards / Computer law / Business / Qualified Security Assessor / Payment Card Industry Data Security Standard / Information technology management / Money / SecurityMetrics / PA-DSS / Data privacy / Electronic commerce / Payment systems

ambersail_padss_assessment

Add to Reading List

Source URL: www.ambersail.com

Language: English - Date: 2015-03-17 07:41:04
912Project management / Method engineering / Standards / Security / COBIT / Information Technology Infrastructure Library / Corporate governance of information technology / Risk management / Easy2comply / Information technology management / Business / Information technology governance

I T-GRC MANAGEMENT Dynasec Enterprise IT-GRC (IT Governance Risk & Compliance) provides a comprehensive IT risk and governance framework for aligning IT operations with corporate objectives and standards. The software pl

Add to Reading List

Source URL: www.dynasec.org

Language: English - Date: 2015-02-15 14:40:45
913Management / Probability / Security / Risk management / Risk / Actuarial science / Ethics

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:10:12
914Information / Classified information / National Archives and Records Administration / Data privacy / Declassification / Disclosure / Information Security Oversight Office / Central Intelligence Agency / Information security / National security / Security / United States government secrecy

AGENCY SECURITY CLASSIFICATION MANAGEMENT PROGRAM DATA

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 14:44:21
915Cartography / Science / Geospatial metadata / Metadata / Geographic information system / Geospatial analysis / Geographic information systems in geospatial intelligence / Pennsylvania Spatial Data Access / Data management / Information / Data

Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 22:58:52
916Data security / Concurrent computing / Privacy / Health Insurance Portability and Accountability Act / Paper shredder / Backup / Shred / Information privacy / Data center / Computing / Data management / Security

DATA BYTE Captricity for Enterprise Data Privacy, Security & Disaster Recovery Overview Secure, HIPAA-compliant enterprise data transformation is our specialty at Captricity. We realize the sensitive nature of your busi

Add to Reading List

Source URL: captricity.com

Language: English - Date: 2015-03-10 12:28:25
917Actuarial science / Auditing / Risk assessment / Information technology audit / Audit / Information security / Information technology audit process / SOX 404 top–down risk assessment / Risk / Management / Security

INTOSAIAuditing IT Service Management RISK ASSESSMENT

Add to Reading List

Source URL: www.intosaiitaudit.org

Language: English - Date: 2013-01-30 23:56:55
918Risk / Risk management / ISO/IEC 27001 / ISO/IEC 27002 / Information security management system / Information technology management / IT risk management / Management / Data security / Computing

Microsoft PowerPoint - 070922RBI-3.ppt

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:17:51
919Cyberwarfare / Computer law / Federal Information Security Management Act / Information technology audit / Security controls / Information security / Certification and Accreditation / Vulnerability / NIST Special Publication 800-53 / Computer security / Security / Data security

Board of Governors of the Federal Reserve System AUDIT OF THE BOARD’S INFORMATION SECURITY PROGRAM OFFICE OF INSPECTOR GENERAL

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2015-01-21 10:09:23
920Security / Evaluation / Information technology management / Computer security / BS / Information security management system / PDCA / W. Edwards Deming / COBIT / Data security / Quality / Management

Microsoft Word - ICAEWArticle04.doc

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:19:06
UPDATE