Security information management

Results: 13712



#Item
251Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Federal Information Security Management Act / Cryptographic Module Testing Laboratory / FIPS 140-3

Microsoft Word - Outline_Intro_FIPS140-2.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
252CIO magazine / Senior management / Corporate title / Chief information security officer

Press Contact Joran Thompson FOR IMMEDIATE RELEASE 

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-03-29 12:07:42
253Disaster preparedness / Emergency management / Humanitarian aid / Occupational safety and health / Federal Emergency Management Agency / Emergency response / United States Department of Homeland Security

ANNEX 3-Basic Plan EMERGENCY PUBLIC INFORMATION PROCEDURES APPENDIX 2 I. INTRODUCTION

Add to Reading List

Source URL: www.scemd.org

Language: English - Date: 2013-01-02 12:25:54
254CIO magazine / Senior management / Corporate title / Chief information security officer

Press Contact Joran Thompson FOR IMMEDIATE RELEASE 

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-05-24 15:37:05
255Computer security / IT risk management / Information assurance / Logic Pro / Department of Defense Information Assurance Certification and Accreditation Process / Request Tracker / Software testing / Windows 8

highresRT_Logic-Kratos_Logo

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2016-08-09 00:40:02
256OpenVAS / Crime prevention / Cryptography / Information governance / National security / Computer security / Vulnerability / Free software / Munich

Greenbone Case Study Vulnerability Management German Armed Forces University, Munich (Universität der Bundeswehr München) Greenbone Security Manager:

Add to Reading List

Source URL: greenbone.net

Language: English - Date: 2016-08-19 11:06:48
257Computer security / Quality / Cryptography / Data security / Information security / National security / Management system

QUALITY AND INFORMATION SECURITY MANAGEMENT SYSTEM POLICY HGC’s Quality and Information Security Policy Statement: Operational standards of efficiency, effectiveness, quality and information security are observed in al

Add to Reading List

Source URL: www.hgc.gov.ph

Language: English - Date: 2016-04-15 11:52:38
258Transportation Security Administration / Aftermath of the September 11 attacks / Transportation in the United States / Aviation in the United States / Federal Air Marshal Service / Airport security / Sensitive Security Information / Full body scanner

Statement of Subcommittee Chairman John Katko (R-NY) Joint Transportation Security and Oversight and Management Efficiency Subcommittee Hearing How Pervasive is Misconduct at TSA: Examining Findings from a Joint Subcommi

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-07-07 09:54:42
259Signature / Records management technology / Cryptography / Computer law / E-commerce / Uniform Electronic Transactions Act / Electronic signature / DocuSign / Digital signature / Information security

DocuSign Envelope ID: 879032A4-1EC5-420B-A5BC-D0A723B2E69F LaNora Tolman, Executive Officer Phone: (Fax: (Email:

Add to Reading List

Source URL: alaska.edu

Language: English - Date: 2015-03-17 13:33:33
260Oracle Corporation / Redwood City /  California / Oracle Database / Federal Information Security Management Act / Accounting software / Invoice processing / Comparison of PSA systems

OVERVIEW/ SUMMARY OF SERVICES

Add to Reading List

Source URL: arc.publicdebt.treas.gov

Language: English - Date: 2016-05-06 08:37:11
UPDATE