Information technology security audit

Results: 1663



#Item
41Information technology audit / United States Department of Homeland Security / Risk / Financial audit / Audit / Information technology controls / Entity-level controls / Internal control / Information technology audit process / Auditing / Accountancy / Business

Information Technology Management Letter for the FY 2014 Department of Homeland Security Financial Statement Audit

Add to Reading List

Source URL: www.oig.dhs.gov

Language: English - Date: 2015-05-27 13:16:32
42Data security / Information technology audit

SKAMANIA COUNTY JOB DESCRIPTION TITLE: OFFICE ASSISTANT V COMMUNITY EVENTS & RECREATION

Add to Reading List

Source URL: www.skamaniacounty.org

Language: English - Date: 2015-05-04 10:25:03
43Computer security / Data security / Risk / Information technology governance / COBIT / Information Systems Audit and Control Association / Information security management system / Vulnerability / Audit / Information technology audit / Auditing / Information technology management

Conference Progam & Key EventsAugust , 2015 Sheraton on the Park – Elizabeth Street, Sydney Sunday 9th August Conference Registration

Add to Reading List

Source URL: www.oceaniacacs2015.org

Language: English - Date: 2015-06-01 18:03:39
44Prevention / Identity management / Certification Commission for Healthcare Information Technology / CCOW / Information technology security audit / Access control / Password / Audit trail / Kerberos / Security / Computer security / Public safety

Instructions: Check the appropriate column to indicate the application’s security capabilities. Please provide any additional responses or detailed explanations of other compensating controls as comments. Please numbe

Add to Reading List

Source URL: www.himss.org

Language: English - Date: 2013-02-13 10:28:31
45Computer security / Password / Antivirus software / Spyware / Firewall / Malware / Wi-Fi / Information security audit / Electronic business / Computer network security / Security / Cyberwarfare

Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need a cybersecurity strategy to protect their own busine

Add to Reading List

Source URL: www.uschamber.com

Language: English - Date: 2013-12-16 17:04:09
46Forensic science / Digital forensics / Knowledge / Crime / Law enforcement / Department of Defense Cyber Crime Center / Computer forensics / Information technology audit / Federal Bureau of Investigation

The University of Alaska Fairbanks Advanced Systems Security Education, Research, and Training (ASSERT) Center presents Mark Pollitt

Add to Reading List

Source URL: assert.uaf.edu

Language: English - Date: 2008-12-30 11:58:23
47Information technology audit / Auditing / Data security / Technology / Email / Internet / Computing

Job Description TITLE: Revenue Coordinator REPORTS TO: Chief Financial Officer (CFO) General Statement of Duties: With minimal supervision, perform a wide variety of specialized bookkeeping functions using computer equip

Add to Reading List

Source URL: www.vmrc.net

Language: English - Date: 2015-04-02 18:31:39
48Skill / Management / Data security / Information technology audit / Security / Risk / Certified Information Systems Auditor / Certified Information Technology Professional / Auditing / Chief financial officer / Corporate governance

      Information  Systems  Manager  

Add to Reading List

Source URL: www.glaciallakesenergy.com

Language: English - Date: 2014-11-26 13:41:56
49Computer security / Business / Information technology audit / Information security / ICQ / Internal control / Information technology security audit / Business continuity planning / Security controls / Auditing / Data security / Security

As public servants, it is our responsibility to use taxpayers’ dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons to place

Add to Reading List

Source URL: finance.utah.gov

Language: English - Date: 2015-05-11 14:09:28
50Data security / Information technology audit / Information technology management / Information security / National security / Credit card / Database / Public safety / Database management systems / Security / Computer security

Microsoft Word - 文書 1

Add to Reading List

Source URL: blog.benesse.ne.jp

Language: English - Date: 2014-09-10 05:54:12
UPDATE