Security risk

Results: 17047



#Item
541

Blue Lava Consulting, LLC | Case Study A Big Data Case Study on Using a Risk-Based Approach for Information Security and Fraud Analytics bluelava

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-06-15 20:20:28
    542Cyberwarfare / Cybercrime / Computer security / Computer network security / Secure communication / EHNAC / Health Insurance Portability and Accountability Act / Cybersecurity Information Sharing Act / United States Department of Homeland Security / Accreditation / Cyber-security regulation / Cyber security standards

    Cybersecurity Protection in Healthcare: How Accreditation Can Mitigate Your Risk

    Add to Reading List

    Source URL: www.ehnac.org

    Language: English - Date: 2016-05-09 17:07:24
    543

    2016 ISACA Certification Boot Camps Earn the ISACA Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk a

    Add to Reading List

    Source URL: www.isaca.org

    Language: English - Date: 2016-04-06 23:50:48
      544Financial markets / Systemic risk / Security / Stock market / Mutual fund / Federal Reserve System / Money market / Investment / Registered Investment Adviser / Investment policy statement

      Cuyahoga Arts & Culture Investment Policy Approved February 7, 2011 Effective February 7, 2011 Updated December 14, 2015

      Add to Reading List

      Source URL: www.cacgrants.org

      Language: English - Date: 2016-01-26 09:12:25
      545Security / Prevention / Data security / Safety / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Risk / Data breach

      Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls Stefan Laube Rainer Böhme

      Add to Reading List

      Source URL: informationsecurity.uibk.ac.at

      Language: English - Date: 2016-04-12 07:21:29
      546Financial markets / Liquidity risk / Market liquidity / Futures contract / Asset-backed security / Hedge fund / Derivative / Asset / Net asset value / Private equity / Systemically important financial institution / Short

      Secretary Brent J. Fields Securities and Exchange Commission 100 F Street, N.E. Washington, DCDecember 2015 Re: File No. S7-16-15

      Add to Reading List

      Source URL: www.interactivedata.com

      Language: English - Date: 2016-04-13 12:13:26
      547Data erasure / CCleaner / Freeware / Piriform / Rogue software / Spyware / Personal computer / Windows 7 / Windows Vista / Microsoft Windows

      BENEFITS OF A CLEAN PC Background PCs whose hard disks are cluttered with unused and temporary files run more slowly than they should, while cookies and Internet history pose a risk to security and privacy. This document

      Add to Reading List

      Source URL: static.piriform.com

      Language: English - Date: 2012-08-15 08:53:41
      548

      Cyber Security in Securities Markets – An International Perspective Report on IOSCO’s cyber risk coordination efforts THE BOARD OF THE INTERNATIONAL ORGANIZATION OF SECURITIES

      Add to Reading List

      Source URL: www.iosco.org

      Language: English - Date: 2016-04-11 06:57:37
        549Banking / Actuarial science / Auditing / Security / Risk / Basel II / Risk management / Operational risk / Financial risk / Asset liability management / Internal audit / Capital requirement

        FXGLOBE LTD RISK MANAGEMENT DISCLOSURES YEAR ENDED 31 DECEMBERMay 2014

        Add to Reading List

        Source URL: s3.amazonaws.com

        Language: English - Date: 2015-08-02 12:03:22
        550Computer security / Security / Data security / IT risk management / Risk analysis / BeyondTrust / Vulnerability / Threat / IT risk / Risk management / Asset

        BeyondTrust Corporate Overview The leader in preventing data breaches from insider privilege abuse and external hacking attacks Reducing IT security risk with unmatched visibility and control The majority of data breache

        Add to Reading List

        Source URL: www.ciosummits.com

        Language: English - Date: 2016-02-10 11:33:29
        UPDATE