Information Technology Security Assessment

Results: 459



#Item
141Risk management / Data privacy / Computer security / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Information privacy / Risk assessment / National Strategy for Trusted Identities in Cyberspace / Ethics / Risk / Management

October 29, 2013 Jacob Reider, MD Acting National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W. Washington, DC 20201

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-11-19 07:12:38
142Risk management / Data privacy / Computer security / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Information privacy / Risk assessment / National Strategy for Trusted Identities in Cyberspace / Ethics / Risk / Management

October 29, 2013 Jacob Reider, MD Acting National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W. Washington, DC 20201

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-11-19 07:12:38
143Data privacy / Credit cards / Computer law / Computing / Information technology management / Payment Card Industry Data Security Standard / Conventional PCI / Acquiring bank / SecurityMetrics / Payment systems / Electronic commerce / Business

Understanding the SAQs for PCI DSS v3.0 The PCI DSS self-assessment questionnaires (SAQs) are validation tools intended to assist merchants and service providers report the results of their PCI DSS self-assessment. The d

Add to Reading List

Source URL: finance.utah.gov

Language: English - Date: 2014-09-19 15:16:53
144Conformity assessment / Economy of Germany / Security / International Multilateral Partnership Against Cyber Threats / Computer security / Siemens / Technology / IECEE/CEE / Computer crimes

October 8, 2014 Response to Request for Information Experience with the Framework for Improving Critical Infrastructure Cybersecurity Docket Number[removed]01 Thank you for this opportunity to respond to the above

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 15:12:37
145Business / Data security / Information Risk Management / Risk analysis / IT risk / Regulatory compliance / Enterprise risk management / Financial Industry Regulatory Authority / Financial adviser / Computer security / Risk / Information technology management

October 9, 2014 Ascendant Compliance Management is an independent consulting firm assisting Registered Investment Advisers and Broker-Dealers with regulatory compliance. Our firm has an IT Risk Assessment and Auditing fu

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 15:12:37
146Data security / Information Risk Management / Risk analysis / Technology assessment / Enterprise risk management / Regulatory compliance / Basel II / Bank / IT risk / Risk / Auditing / Information technology management

Educational Training for Community Banks Live Webinar Archived Webinar Link & Free CD Rom ROUTING SLIP

Add to Reading List

Source URL: www.nicbonline.com

Language: English - Date: 2014-02-13 11:23:19
147Risk / Software testing / Computer network security / Vulnerability / Social vulnerability / Threat / Risk assessment / Information Technology Security Assessment / Cyberwarfare / Computer security / Security

Type of Submission: Paper Title or Topic: The Network Vulnerability Tool (NVT) – A System Vulnerability Visualization Architecture

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
148Technology / Systems science / Systems theory / Information Technology Security Assessment / Systems engineering / Systems engineering process / Design review

XLC Iterative Development Graphic

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2014-11-21 12:32:28
149Internal audit / United States Environmental Protection Agency / Audit / Risk / Business / Data security / Finance / Information technology audit / Auditing / Government procurement in the United States / United States administrative law

Response to Office of Inspector General Audit Report No. 14-P-0347, "EPA Needs to Improve Contract Management Assessment Program Implementation to Mitigate Contracting Vuhierabilities", dated September 2, 2014

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2014-11-21 08:28:07
150System software / Computing / WhatsUp Gold / Ipswitch /  Inc. / Backup / Simple Network Management Protocol / Configuration management / Security Technical Implementation Guide / Deep configuration assessment / Information technology management / Network management / System administration

WhatsUp-Gold-Logo-Tagline-CMYK

Add to Reading List

Source URL: www.whatsupgold.com

Language: English - Date: 2013-08-07 15:25:26
UPDATE