Security information management

Results: 13712



#Item
321Data security / System administration / Security / Splunk / Risk management framework / Cyberwarfare / NIST Special Publication 800-53 / Department of Defense Information Assurance Certification and Accreditation Process / Risk management / Computer security

TECH BRIEF SPLUNK FOR RISK MANAGEMENT FRAMEWORK Assessing and Monitoring NISTControls “...Through the process of risk management, leaders must consider risk to U.S. interests from

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-16 18:10:53
322Chief information security officer / CIO magazine / Senior management / Chief information officer

Press Contact Joran Thompson FOR IMMEDIATE RELEASE 

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-05-23 13:21:30
323Internet privacy / Privacy / Identity management / Information privacy / HTTP cookie / Medical privacy / Personally identifiable information / Opt-out / Do Not Track legislation / In re Gateway Learning Corp.

Optimal Blue, LLC Security and Privacy Policy Optimal Blue, LLC, 5340 Legacy Drive, Suite 250, Plano, TXwhich is referred to below as "Optimal Blue, LLC", “Optimal Blue” or "we" or "us" or "our." LAST UPDATED/

Add to Reading List

Source URL: www2.optimalblue.com

Language: English - Date: 2016-07-18 15:03:10
324Auditing / Computer security / Data security / Entity-level controls / Management accounting / Information security / Internal control / Vulnerability / Internal audit / Audit / Security controls / Outsourcing

GUIDELINES ON CONTROL OBJECTIVES & PROCEDURES FOR OUTSOURCED SERVICE PROVIDERS 26 June 2015

Add to Reading List

Source URL: abs.org.sg

Language: English - Date: 2016-02-04 09:38:58
325Actuarial science / Crime prevention / Security / Cryptography / Information governance / Control Risks / Risk management / Maritime security / Risk / Security guard / Computer security / Catherine Zara Raymond

CAPABILITY STATEMENT MARITIME SERVICES Control Risks is a premier provider of risk management services to the maritime community. With over 20 years’ experience, over 100 clients in the sector and a comprehensive suite

Add to Reading List

Source URL: www.controlrisks.com

Language: English - Date: 2013-08-13 07:17:51
326Computer forensics / FireEye / Cyberwarfare / Computer network security / Data security / Secure communication / Security information and event management / Computer security / Cloud computing / Network tap

THREAT ANALYTICS PLATFORM: CLOUD COLLECTOR EVENT GENERATOR THAT SECURELY CREATES AND STREAMS EVENT DATA TO THE FIREEYE THREAT ANALYTICS PLATFORM (TAP) OV E R V I E W

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2016-06-24 18:23:18
327Information management / Portal software / Records management / Records management technology / SharePoint / Web part / Microsoft Commerce Server / Intranet / SharePoint Dashboard / Draft:BA Insight

Robert L. Bogue MS MVP, MCSE, MCSA:Security Keys to SharePoint

Add to Reading List

Source URL: www.thorprojects.com

Language: English - Date: 2015-07-23 12:40:06
328Information technology management / National security / E-commerce / Computer network security / Computer security / Cryptography / Software / Business process management

Microsoft Word - This Time The Gathering Storm is Digital.doc

Add to Reading List

Source URL: ontopilot.com

Language: English - Date: 2016-03-21 13:58:05
329Computer access control / Access control / Directory services / Federated identity / Distributed Common Ground System / Equipment of the United States Air Force / DCGS-A / XACML / Single sign-on / DCGS / Authentication / Active Directory

Identity and Access Management (IdAM) Security Framework for DCGS-Army The Distributed Common Ground System-Army (DCGS-Army) is a data system that supports field intelligence, surveillance information, and situational aw

Add to Reading List

Source URL: www.jerichosystems.com

Language: English - Date: 2016-02-10 13:54:31
330CIO magazine / Chief information officer / Senior management / Corporate title / Chief information security officer

Press Contact Joran ThompsonFOR IMMEDIATE RELEASE 

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-03-16 15:43:32
UPDATE