Information security audit

Results: 2404



#Item
41California / Aerial firefighting / Wildland fire suppression / Prevention / Safety / California Department of Forestry and Fire Protection / Firefighting in the United States / Firefighting / Fire marshal / Internal audit / Cal / Information security

Department of Forestry and Fire Protection 2015 SLAA REPORT March 3, 2016 John Laird, Secretary California Natural Resources Agency

Add to Reading List

Source URL: www.calfire.ca.gov

Language: English - Date: 2016-03-10 10:06:52
42Actuarial science / Auditing / Professional studies / Enterprise risk management / Information technology audit / Risk / Business / Security / Chief risk officer / ERM / Risk management

ENTERPRISE RISK MANAGEMENT POLICY Ref No 11

Add to Reading List

Source URL: www.pidm.gov.my

Language: English - Date: 2014-11-25 08:29:12
43Computer forensics / AT Attachment / Host protected area / Information technology audit / Center for Advanced Security Research Darmstadt / Device configuration overlay / Baier / International Monetary Fund / Anti-computer forensics / IMF

AFAUC – anti-forensics of storage devices by alternative use of communication channels Harald Baier, Julian Knauer Hochschule Darmstadt, CASED

Add to Reading List

Source URL: www.imf-conference.org

Language: English - Date: 2014-05-21 12:58:53
44Auditing / Computer security / Information technology audit / Data security / Corporate governance / Internal audit / Chief audit executive / Audit / Information security / Information Technology Security Assessment / Corporate governance of information technology / Security controls

© JORDAN YOUNGS Report of the Information and Communication Technology (ICT) Division – Information Technology Security Audit Fiscal Year (2014 – 2015)

Add to Reading List

Source URL: www.eco.gov.yk.ca

Language: English - Date: 2016-01-26 14:30:26
45

State Agency Information Systems: Reviewing Security Controls in Selected State Agencies Under the provisions of K.S.A, the Legislative Division of Post Audit conducts information technology security audits of s

Add to Reading List

Source URL: www.kslpa.org

- Date: 2015-12-21 13:20:20
    46

    GAPSA GA MeetingHouston Hall – Ben Franklin Room Audit, Compliance and Privacy Presentation (Maura Johnston) Anne: we had a meeting a while ago with office of privacy about data security and information securi

    Add to Reading List

    Source URL: gapsa.upenn.edu

    Language: English - Date: 2012-10-04 16:01:04
      47

      ASP・SaaSに対する情報セキュリティ 監査をふまえた クラウドコンピューティングに対する 一考察 A study on Cloud computing based on information security audit for ASP・SaaS

      Add to Reading List

      Source URL: www.saajk.org

      Language: Japanese - Date: 2012-08-25 01:45:29
        48Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

        Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

        Add to Reading List

        Source URL: naveen.ksastry.com

        Language: English - Date: 2013-06-08 15:25:46
        49Security / ISO/IEC 27001 / Audit / Information security / ISO/IEC 27006 / Information technology audit process / ISO/IEC 27000-series / Auditing / Accountancy / Risk

        Digital repository audit and certification Notes on the requirements for auditors February 4, 2009 At the face-to-face meeting in Berlin in October 2008, a start was made on adapting ISO 27006, “Requirements for bodies

        Add to Reading List

        Source URL: wiki.digitalrepositoryauditandcertification.org

        Language: English - Date: 2011-08-14 13:24:35
        50Security / Certified Information Systems Security Professional / Global Information Assurance Certification / (ISC)² / Information technology audit / ACIS / Information Systems Audit and Control Association / Penetration test / Computer security / Data security / Computing

        Prinya Hom-anek, CISSP, CSSLP, CRISC, SANS GIAC, GCFW President & Founder, ACIS Professional Centre, Thailand Member, (ISC)² Asian Advisory Board -------------------------------------------------------------------------

        Add to Reading List

        Source URL: www.informationsecurityasia.com

        Language: English - Date: 2012-07-19 00:22:00
        UPDATE