Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

Page text matches

  • ==Organizational Security== ...ogram Charter and supporting policies that are required to comply with ISO Security Policy objectives.<br> ...
    2 KB (202 words) - 12:40, 15 June 2007
  • :Pointers to informative books on information security.<br> :Frequently asked questions and answers about security-related topics.<br> ...
    1,015 bytes (132 words) - 14:09, 8 March 2007
  • ==Federal information security incident center== ...— The Director shall ensure the operation of a central Federal information security incident center to—<br> ...
    1 KB (196 words) - 19:07, 3 June 2010
  • ==Sources of standards for Information Security== ...n Security Management System]]s" are of particular interest to information security professionals.<br> ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ...ses primarily out of [[ISO/IEC 17799]], a code of practice for information security management published by the [[International Organization for Standardizatio ...pts. ISM3 can be used as a template to make ISO 9001 compliant information security management systems. While ISO 27001 is controls based, ISM3 is process base ...
    2 KB (257 words) - 17:09, 22 March 2007
  • ...ework for ensuring the effectiveness of information security controls over information resources that support Federal operations and assets;<br> ...dination of information security efforts throughout the civilian, national security, and law enforcement communities;<br> ...
    1 KB (192 words) - 10:33, 1 June 2010
  • ...ework for ensuring the effectiveness of information security controls over information resources that support Federal operations and assets;<br> ...dination of information security efforts throughout the civilian, national security, and law enforcement communities;<br> ...
    1 KB (192 words) - 10:36, 1 June 2010
  • :'''Assign to an individual or team the following information security management responsibilities:'''<br> ...security policies and procedures to verify that the following information security responsibilities are specifically and formally assigned: ...
    2 KB (303 words) - 16:00, 2 March 2007
  • =='''Information Security Research Resources'''== ...-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident res ...
    978 bytes (124 words) - 00:00, 26 March 2007
  • ...ded to create, implement, and maintain a risk management-based Information Security Program that complies with SOX Section 404.<br> ...andards) that are needed to create, implement, and maintain an Information Security Program that complies with SOX Section 404.<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ==National security systems== The head of each agency operating or exercising control of a national security system shall be responsible for ensuring that the agency—<br> ...
    709 bytes (103 words) - 10:41, 2 June 2010
  • ==National security systems== The head of each agency operating or exercising control of a national security system shall be responsible for ensuring that the agency—<br> ...
    709 bytes (103 words) - 21:02, 3 June 2010
  • ==Sample Information Security Program Charter== ...tandards provide more measurable guidance in each policy area. Information Security procedures describe how to implement the standards. ...
    2 KB (316 words) - 15:19, 13 January 2014
  • ...mation Systems Auditor (CISA) and works for a fortune 500 company in their Security Assurance and Compliance department. Thomas holds Microsoft, Cisco and ...
    520 bytes (73 words) - 13:42, 16 March 2007
  • ==Sample Employee Ongoing Security Awareness Standard== ...and provides specific instructions and requirements for providing ongoing security awareness education and training for Company employees. ...
    2 KB (275 words) - 17:10, 23 January 2014
  • :'''Assign to an individual or team the following information security management responsibilities:'''<br> ...security policies and procedures to verify that the following information security responsibilities are specifically and formally assigned: ...
    2 KB (293 words) - 15:59, 2 March 2007
  • :'''Assign to an individual or team the following information security management responsibilities:'''<br> ...security policies and procedures to verify that the following information security responsibilities are specifically and formally assigned: ...
    2 KB (296 words) - 16:02, 2 March 2007
  • ...sting templates containing questions that can be used to gauge and promote security awareness in specific areas. The testing can be distributed and responses c ...ity Best Practices and Addressing Regulatory Mandates Testing Template:|'''Security Best Practices and Addressing Regulatory Mandates test Template''']]<br> ...
    2 KB (289 words) - 16:08, 3 August 2006
  • ...hopefully assist you in finding your way around this expanding information security, compliance, risk, educational, and I trust, enlightening community resourc ...with various areas of expertise come together out of a common passion for security. ...
    2 KB (313 words) - 09:44, 3 April 2009
  • :'''Assign to an individual or team the following information security management responsibilities:'''<br> ...security policies and procedures to verify that the following information security responsibilities are specifically and formally assigned: ...
    2 KB (294 words) - 20:02, 2 March 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)