Information Technology Security Assessment

Results: 459



#Item
21Probability / Technology assessment / United States administrative law / Risk management / Evaluation / Risk assessment / Government procurement in the United States / Information security / Business requirements / Impact assessment / Risk / Security

B.1 SIMM 19B Preparation Instructions

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2014-12-30 16:23:23
22Data / Data security / Software development process / Information technology management / Needs assessment / Black Hat Briefings / Federal Information Security Management Act / Hacker / Information security / Computer security / Security / Computing

Joseph Klein The Social Engineering Engagement Methodology—A Formal Testing Process of the People and Process The security of an organization is composed of technology, people and processes. In the last few years, many

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
23Computing / National Institute of Standards and Technology / NIST Special Publication 800-53 / Risk management / Federal Information Security Management Act / Security controls / Information security / Risk management framework / Privacy / Computer security / Security / Data security

DRAFT Special Publication 800-53A Revision 4, Federal Information Systems and Organizations: Building Effective Assessment Plans has been approved as FINAL by the following publication: Publication Number: Special Publi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-12 11:42:50
24Personally identifiable information / Security / Computer security / Data security / Government / Risk / Security controls / Government Accountability Office / Open government / Technology assessment

GAO-15-371T Highlights, HIGH-RISK SERIES: An Update

Add to Reading List

Source URL: www.gao.gov.

Language: English - Date: 2015-02-11 10:08:17
25Credit cards / Computer law / Business / Qualified Security Assessor / Payment Card Industry Data Security Standard / Information technology management / Money / SecurityMetrics / PA-DSS / Data privacy / Electronic commerce / Payment systems

ambersail_padss_assessment

Add to Reading List

Source URL: www.ambersail.com

Language: English - Date: 2015-03-17 07:41:04
26Actuarial science / Auditing / Risk assessment / Information technology audit / Audit / Information security / Information technology audit process / SOX 404 top–down risk assessment / Risk / Management / Security

INTOSAIAuditing IT Service Management RISK ASSESSMENT

Add to Reading List

Source URL: www.intosaiitaudit.org

Language: English - Date: 2013-01-30 23:56:55
27Ethics / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Common Criteria / Protection Profile / Evaluation Assurance Level / Security Target / Validation / Evaluation / Computer security / Thought

Trust Technology Assessment Program Common Criteria Certificate

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
28Personally identifiable information / Security / Government procurement in the United States / Data security / Government / Security controls / Government Accountability Office / Open government / Technology assessment

GAO-15-373T Highlights, HIGH-RISK SERIES: An Update

Add to Reading List

Source URL: www.gao.gov.

Language: English - Date: 2015-02-11 15:02:40
29Information Risk Management / Information technology management / Risk analysis / Regulatory compliance / Security / Audit / Business / Dodd–Frank Wall Street Reform and Consumer Protection Act / IT risk / Risk / Computer security / Data security

Compliance Health Check Best Practices Compliance Assessment for Charles River IMS Clients Keeping Up With Changing Business and Regulatory Needs The Charles River Compliance Health Check helps Charles River IMS clients

Add to Reading List

Source URL: www.crd.com

Language: English - Date: 2014-07-01 10:45:47
30Security / Actuarial science / Infrastructure / Security engineering / National Infrastructure Protection Plan / National Cyber Security Division / Risk management / Risk / Critical infrastructure protection / United States Department of Homeland Security / Public safety / National security

Fact Sheet INFORMATION TECHNOLOGY SECTOR BASELINE RISK ASSESSMENT PURPOSE:  The Information Technology (IT) Sector Baseline Risk Assessment provides an  evaluation of risk to the IT Sector infra

Add to Reading List

Source URL: www.it-scc.org

Language: English - Date: 2015-02-20 13:33:26
UPDATE