Information technology security audit

Results: 1663



#Item
1Computing / Security / Computer security / Data security / Crime prevention / Cryptography / National security / Information technology audit / Vulnerability / Certified Information Security Manager / Professional certification / Information security

Sean T. Malone 6810 168th St SW Lynnwood, WAMobile: Email: Personal Website: www.seantmalone.com LinkedIn: www.linkedin.com/in/seantmalone

Add to Reading List

Source URL: www.seantmalone.com

Language: English - Date: 2016-05-01 16:39:19
2Auditing / Economy / Business / Audit / Information technology security audit / New Jersey State Auditor

AGENDA Meeting of the Legislative Post Audit Committee Tuesday, April 26, 2016 Room 118-N, Statehouse 10:15 a.m. – 1:30 p.m. 10:15 a.m.

Add to Reading List

Source URL: www.kslpa.org

Language: English - Date: 2016-04-22 11:22:58
3Computing / Auditing / Business economics / Information technology audit / Accounting / Security / Computer security / Data security / Audit / Information technology security audit / Security controls / New Jersey State Auditor

Microsoft WordScope Statement (Sdocx

Add to Reading List

Source URL: www.kslpa.org

Language: English - Date: 2016-02-11 17:28:05
4Security / Prevention / Computer security / Access control / Data security / Cryptography / National security / Health Insurance Portability and Accountability Act / Medical privacy / Electronic health record / Vulnerability / Information technology audit

HIPAA Security Series #4 - Technical Safeguards

Add to Reading List

Source URL: www.hhs.gov

Language: English - Date: 2015-09-03 14:19:54
5Business economics / Auditing / Accounting / Economy / Information technology audit / Audit / Texas Juvenile Justice Department / Information security

An Audit Report on Financial Processes at the Juvenile Justice Department

Add to Reading List

Source URL: www.sao.texas.gov

Language: English - Date: 2016-06-29 13:38:36
6Information technology management / Information technology governance / Information technology / Privacy / Information technology audit / Computing / COBIT / Data security / ISACA / Information security / Business process management / Val IT

Cybersecurity Forum August 19, 2015 COBIT 5 Lets Play 50 Questions (more or less)

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2015-08-19 23:26:10
7Prevention / Espionage / Security / Surveillance Devices Act / Independent Commission Against Corruption / Crime prevention / Law enforcement / National security / Audit / Surveillance / Covert listening device / Information technology audit

Report of an audit of applications for and execution of listening device warrants by the Independent Commission Against Corruption The Inspector of the Independent Commission

Add to Reading List

Source URL: www.oiicac.nsw.gov.au

Language: English - Date: 2015-06-15 22:42:00
8Prevention / Security / Computing / Information technology audit / Computer security / Cryptography / National security / Information security audit / Information technology security audit / Information security / Audit / Threat

Microsoft Word - IBSNew_Trends_in_iTECH-final

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:13
9Criminal record / Auditing / Audit / Fingerprint / Computerized Criminal History / Information technology audit / Computing / Security / Data

REPORT2ndJUDICIAL2009.xls

Add to Reading List

Source URL: dps.alaska.gov

Language: English - Date: 2011-08-12 19:09:27
10Auditing / Accounting / Risk / Prevention / Information technology audit / Audit / Internal audit / Information technology security audit / Information security audit / Information security / EGovernment in Europe / Chief audit executive

Diploma-Themes-1rst-Block

Add to Reading List

Source URL: extrw.univie.ac.at

Language: English - Date: 2012-03-20 13:58:39
UPDATE