Information security audit

Results: 2404



#Item
61Usability / Technology / Audit / Systems engineering process / Data security / Business / IT risk management / Defence Science and Technology Agency / Information technology management / Human–computer interaction / Technical communication

Microsoft Word - NPOKI Consuting Services_11_Final _2_.doc

Add to Reading List

Source URL: www.npoki.org

Language: English - Date: 2009-12-21 17:56:42
62International Telecommunication Union / Computer security / Information Systems Audit and Control Association / Cyberwarfare / Professional certification / Computing / Security / Computer crimes / International Multilateral Partnership Against Cyber Threats

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2015-04-15 17:05:06
63Security / Computer security / Auditing / Information Systems Audit and Control Association / Certified Information Security Manager / International Multilateral Partnership Against Cyber Threats / COBIT / Corporate governance of information technology / Certified Information Systems Auditor / Data security / Information technology management / Information technology audit

Isaca_Cybersecurity_r2_v6_8.5x11

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2015-03-27 10:28:47
64Business / Audit committee / Internal audit / Audit / Internal control / Committee of Sponsoring Organizations of the Treadway Commission / External auditor / Institute of Internal Auditors / Information security / Auditing / Accountancy / Risk

The term control environment refers to an agency’s “corporate culture,” showing how much the agency’s leaders value ethical behavior and internal control. The key element in a favorable control environment is ma

Add to Reading List

Source URL: finance.utah.gov

Language: English - Date: 2015-05-11 14:05:37
65Auditing / Business / Enterprise risk management / Information technology audit / Security / Risk management / Chief risk officer / Milliman / Financial risk / Actuarial science / Management / Risk

Milliman Risk Institute Survey Preliminary results The inaugural survey from the Milliman Risk Institute

Add to Reading List

Source URL: us.milliman.com

Language: English - Date: 2013-01-07 20:30:42
66Information technology audit / United States Department of Homeland Security / Risk / Financial audit / Audit / Information technology controls / Entity-level controls / Internal control / Information technology audit process / Auditing / Accountancy / Business

Information Technology Management Letter for the FY 2014 Department of Homeland Security Financial Statement Audit

Add to Reading List

Source URL: www.oig.dhs.gov

Language: English - Date: 2015-05-27 13:16:32
67Data security / Information technology audit

SKAMANIA COUNTY JOB DESCRIPTION TITLE: OFFICE ASSISTANT V COMMUNITY EVENTS & RECREATION

Add to Reading List

Source URL: www.skamaniacounty.org

Language: English - Date: 2015-05-04 10:25:03
68Computer security / Data security / Risk / Information technology governance / COBIT / Information Systems Audit and Control Association / Information security management system / Vulnerability / Audit / Information technology audit / Auditing / Information technology management

Conference Progam & Key EventsAugust , 2015 Sheraton on the Park – Elizabeth Street, Sydney Sunday 9th August Conference Registration

Add to Reading List

Source URL: www.oceaniacacs2015.org

Language: English - Date: 2015-06-01 18:03:39
69Prevention / Identity management / Certification Commission for Healthcare Information Technology / CCOW / Information technology security audit / Access control / Password / Audit trail / Kerberos / Security / Computer security / Public safety

Instructions: Check the appropriate column to indicate the application’s security capabilities. Please provide any additional responses or detailed explanations of other compensating controls as comments. Please numbe

Add to Reading List

Source URL: www.himss.org

Language: English - Date: 2013-02-13 10:28:31
70Computer security / Password / Antivirus software / Spyware / Firewall / Malware / Wi-Fi / Information security audit / Electronic business / Computer network security / Security / Cyberwarfare

Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need a cybersecurity strategy to protect their own busine

Add to Reading List

Source URL: www.uschamber.com

Language: English - Date: 2013-12-16 17:04:09
UPDATE