Chief security officer

Results: 1897



#Item
371Management / Information systems / Federal Emergency Management Agency / Homeland security / U.S. Immigration and Customs Enforcement / Government Accountability Office / Chief information officer / SBInet / Sensitive security information / Public safety / United States Department of Homeland Security / Emergency management

GAO-06-598T Homeland Security: Progress Continues, but Challenges Remain on Department's Management of Information Technology

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2006-03-30 13:56:01
372Politics of the United States / Government / Social Security Administration / Social Security number / Government procurement in the United States / Economy of the United States / Office of the Chief Actuary / Privacy Act / Social Security / Taxation in the United States / United States administrative law

Federal Register / Vol. 70, No[removed]Friday, October 28, [removed]Notices comments and recommendations regarding the information collection should be submitted to the OMB Desk Officer and the SSA Reports Clearance Officer

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-29 18:25:41
373Crime / Chief information officer / Security guard / Management

RITC Security Incident Policy, Approved[removed]

Add to Reading List

Source URL: www.kansasregents.org

Language: English - Date: 2014-10-08 02:56:21
374Economics / Corporate finance / Debt / Securities / Stock market / Trust-preferred security / Capital requirement / Preferred stock / Tier 2 capital / Financial economics / Finance / Banking

Federal Reserve System Pt. 225, App. A board of directors or the chief executive officer of an affiliated section 20 subsidiary.

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-04-23 14:52:25
375Risk / Public safety / Chief information security officer / Enterprise risk management / Information security / IT risk management / Security / Computer security / Data security

Modulo Hosts Second Annual Customer Advisory Board and First International User Group Conference Featuring Keynote by GRC and Security Industry Luminary Steve Hunt Leading CISOs and CSOs will discuss the latest innovatio

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-03-21 08:06:31
376Management / Chief financial officer / Corporate governance / Debarment / Office of Management and Budget / Government procurement in the United States / United States Department of Homeland Security / Central Intelligence Agency / Federal Emergency Management Agency / United States administrative law / Government / Public safety

  September 18, 2012 The Honorable Joseph I. Lieberman Chairman

Add to Reading List

Source URL: www.federalnewsradio.com

Language: English - Date: 2014-07-14 18:38:11
377Visa / Security Advisory Opinion / SEVIS / United States Department of Homeland Security / Foreign workers / Visa Waiver Program / Visa policy in the European Union / Foreign relations of the United States / Tourism in the United States / United States visas

TESTIMONY OF ALAN D. BERSIN ASSISTANT SECRETARY FOR INTERNATIONAL AFFAIRS AND CHIEF DIPLOMATIC OFFICER OFFICE OF INTERNATIONAL AFFAIRS U.S. DEPARTMENT OF HOMELAND SECURITY

Add to Reading List

Source URL: judiciary.house.gov

Language: English - Date: 2014-04-03 11:20:41
378Data privacy / Privacy law / Computer security / Health Insurance Portability and Accountability Act / Data security / Security / Privacy policy / Chief privacy officer / Information security / Ethics / Law / Government

DEPARTMENT OF MENTAL HEALTH AND

Add to Reading List

Source URL: tennessee.gov

Language: English - Date: 2011-09-01 14:40:22
379Human rights / Law / Privacy / Privacy Office of the U.S. Department of Homeland Security / United States Department of Homeland Security / Health Insurance Portability and Accountability Act / Internet privacy / Chief privacy officer / Ethics / Privacy law / Data privacy

THE UNIVERSITY OF TEXAS SYSTEM ADMINISTRATION HIPAA PRIVACY MANUAL Page: 1 of 2 Section 8.4: Mitigation of Known Privacy Violations Effective Date: September 23, 2013

Add to Reading List

Source URL: www.utsystem.edu

Language: English - Date: 2013-12-31 10:15:02
380Computer network security / Cyberwarfare / Crime prevention / National security / Security information and event management / Threat / RSA / Analytics / Security controls / Computer security / Security / Data security

BIG DATA FUELS INTELLIGENCE-DRIVEN SECURITY Rapid growth in security information creates new capabilities to defend against the unknown Authors Sam Curry, Chief Technology Officer, Identity and Data Protection business u

Add to Reading List

Source URL: www.emc.com

Language: English
UPDATE