Security information management

Results: 13712



#Item
961Public safety / Prevention / Information security / Risk management / Security controls / Data security / Security / Computer security

Information and ICT Services Protection Policy 1.1 The CSIR recognises that information and information systems and supporting infrastructure are critical to its success and effectiveness as an organisation. It

Add to Reading List

Source URL: www.csir.co.za

Language: English - Date: 2007-12-06 09:23:00
962Data management / Data / Technical communication / Knowledge representation / Information architecture / Service-oriented architecture / Checklist / Findability / Data architecture / Information / Enterprise architecture / Information science

JOURNAL OF INFORMATION ARCHITECTURE | VOLUME 2 ISSUE 2 PEER-REVIEWED PAPER Laura Downey Transportation Security Administration (TSA)

Add to Reading List

Source URL: journalofia.org

Language: English - Date: 2011-01-31 09:25:38
963Trustworthy computing / Ronny / Electronic signature / Electronic identity card / Privacy / Security / Ethics / Computer security / Information technology management

Ronny Bjones Director of Cloud Identity & Privacy Services Microsoft Ronny Bjones is currently working for Microsoft Engineering (Server & tools division) as Director of Cloud Identity & Privacy Services. Ronny builds ne

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 08:38:29
964Vulnerability / Open Vulnerability and Assessment Language / Social vulnerability / Common Vulnerabilities and Exposures / Information security / Information assurance / SAINT / Information assurance vulnerability alert / Computer security / Cyberwarfare / Security

Information Assurance Vulnerability Assessment Tool 2. Task Order Title Enterprise License for an automated Information Assurance Vulnerability Management (IAVM) Compliance Tool. Background

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 15:17:16
965Backup / Contingency / Logic / Business / Data security / Contingency plan / Emergency management

BEML WEBSITE POLICY CONTINGENCY MANAGEMENT The presence of the website on the Internet and very importantly the site is fully functional all the times. It is expected of the Government websites to deliver information an

Add to Reading List

Source URL: www.bemlindia.com

Language: English - Date: 2013-04-19 08:00:20
966Computer security / Information technology management / Heroku / Certified Information Systems Security Professional / Information security / Salesforce.com / Data security / Computing / Security

About the Speaker Adam Ely Co-Founder, Bluebox Adam Ely is the Founder and COO of Bluebox. Prior to this role, Adam was the CISO of the Heroku business unit at Salesforce where he was responsible for application security

Add to Reading List

Source URL: cloudsecurityworld.homestead.com

Language: English - Date: 2014-10-29 13:58:32
967National Institute for Occupational Safety and Health / Firefighter / Public information officer / Emergency management / Ambulance / United States Fire Administration / Security / Firefighting in the United States / Occupational safety and health / Public safety

The Highlights: Shifting the Emergency Services Safety Culture

Add to Reading List

Source URL: www.usfa.fema.gov

Language: English - Date: 2015-04-10 09:58:44
968National Weather Service / Database management systems / Information security / Database / Access control / Security / Computer security / Public safety

Privacy Impact Assessment

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2013-08-12 13:22:31
969Digital rights management / Information / Security / Identifiers / International Standard Audiovisual Number / Isan

APPROVAL FORM FOR THE ISAN APPROVAL FORM FOR THE ISAN DATABASE ONLINE ACCESS 1/1

Add to Reading List

Source URL: www.pl.isan.org

Language: English - Date: 2013-10-15 05:40:09
970Credit cards / Computer law / Business / Information technology management / Payment Card Industry Data Security Standard / Payment card industry / SecurityMetrics / Card security code / Information security / Payment systems / Data privacy / Electronic commerce

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions

Add to Reading List

Source URL: www.westpac.com.au

Language: English - Date: 2014-08-23 00:10:57
UPDATE