Moving Toward Better Security for Today and Tomorrow (Englisch)
- Neue Suche nach: Saurbaugh, Mike
- Neue Suche nach: Saurbaugh, Mike
In:
ISACA journal
;
2
;
18-21
;
2019
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Moving Toward Better Security for Today and Tomorrow
-
Beteiligte:Saurbaugh, Mike ( Autor:in )
-
Erschienen in:ISACA journal ; 2 ; 18-21
-
Verlag:
- Neue Suche nach: Information Systems Audit and Control Association
-
Erscheinungsdatum:01.01.2019
-
Format / Umfang:4 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.450285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.450285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 2
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Information Security Matters: Disaster Recovery Management in the Multi-Modal EraRoss, Steven J. et al. | 2018
- 3
-
Information Security Matters: Do You Need a Disaster Recovery Plan...?Ross, Steven J. et al. | 2017
- 4
-
Information Security Matters: What Is the Value of Security?Ross, S.J. et al. | 2011
- 4
-
Looking Back: Information Security MattersRoss, S.J. et al. | 2014
- 4
-
Information Security Matters: CyberwhatsitRoss, Steven J. et al. | 2015
- 4
-
Information Security Matters: What Is Information Security Worth?Ross, Steven J. et al. | 2019
- 4
-
Information Security Matters: Weary Willie's Guide to Cyberrisk ManagementRoss, Steven J. et al. | 2016
- 4
-
Making Preparedness PayRoss, S.J. et al. | 2012
- 6
-
IS Audit Basics: Innovation in the IT Audit ProcessCooke, Ian et al. | 2018
- 6
-
The NetworkQuinlan, George et al. | 2016
- 6
-
IS Audit Basics: The Auditors, IS/IT Policies and ComplianceGelbstein, Ed et al. | 2017
- 6
-
Gates Corporation Makes Sales a Companywide Effort in the CloudBerridge, E. et al. | 2012
- 6
-
IT Audit Basics: Understanding the New SOC ReportsSingleton, T.W. et al. | 2011
- 6
-
Information Security Matters: Shedding TiersRoss, S.J. et al. | 2014
- 7
-
IS Audit Basics: Auditing CybersecurityCooke, Ian et al. | 2019
- 8
-
Changing Times and the Eternality of EthicsRaval, V. et al. | 2012
- 8
-
IS Audit Basics: Is There Such a Thing as a Bad IS Auditor?, Part 2Gelbstein, Ed et al. | 2016
- 10
-
IS Audit Basics: Successful Audits Do Not Just HappenGelbstein, Ed et al. | 2015
- 10
-
Information Ethics: Is Information Technology Responsible for Corporate Crises?Raval, Vasant et al. | 2016
- 10
-
Testing Controls Associated With Data TransfersSingleton, T.W. et al. | 2012
- 11
-
Enterprise Security for the Executive: Setting the Tone From the TopAxelrod, C.W. et al. | 2011
- 11
-
Information Ethics: The Piracy of PrivacyRaval, V. et al. | 2014
- 12
-
Mobile Application SecurityCano M., J.J. et al. | 2011
- 12
-
Information Ethics: Information Technology and Innovation EthicsRaval, Vasant et al. | 2015
- 12
-
The Practical Aspect: Third-party Risk ManagementRaval, Vasant / Shah, Samir et al. | 2017
- 13
-
Changing the Mind-set-Creating a Risk-conscious and Security-aware CulturePironti, J.P. et al. | 2012
- 13
-
A Cost-effective Approach for Sarbanes-Oxley-regulated Application Systems With Minimal IT Control AssuranceJegousse, L. et al. | 2011
- 13
-
Book Review: Data Privacy for the Smart GridKivisild, A. Krista et al. | 2016
- 14
-
Innovation Governance: What Is Innovation?Kelley, K. Brian et al. | 2019
- 14
-
Risk Management in Agile Projects ([non-Roman script word])Moran, Alan et al. | 2016
- 14
-
IS Audit Basics: Risk to Entities Regarding Data BreachesSingleton, T. et al. | 2014
- 15
-
Technology's Role in Enterprise Risk ManagementBayuk, Jennifer et al. | 2018
- 16
-
Book Review: The Soft Edge: Where Great Companies Find Lasting SuccessIppoliti, Dino et al. | 2015
- 17
-
Book Review: IT Strategic and Operational ControlsPrandini, M.P. et al. | 2014
- 17
-
IT Scenario Analysis in Enterprise Risk ManagementFischer, U. et al. | 2011
- 17
-
Book Review: Governance of Enterprise IT Based on COBIT® 5: A Management GuidePrandini, Maria Patricia et al. | 2015
- 18
-
COBIT 5 Processes From a Systems Management PerspectiveSuer, M. / Cullens, C. / Brancato, D. et al. | 2014
- 18
-
Moving Toward Better Security for Today and TomorrowSaurbaugh, Mike et al. | 2019
- 18
-
Auditing Agile—A Brave New World ([non-Roman script word])Ee, Chong et al. | 2016
- 18
-
How Analytics Will Transform Internal AuditKress, Robert E. / Hildebrand, Dave M. et al. | 2017
- 18
-
Internet of Things Offers Great Opportunities and Much RiskGonzalez, Marcelo Hector / Djurica, Jana et al. | 2015
- 20
-
Security Through Effective Penetration TestingTrull, J. et al. | 2012
- 21
-
Is the TJ Hooper Case Relevant for Today's Information Security Environment?Tester, D. et al. | 2013
- 21
-
Key Considerations When Evaluating ISRM Programs and CapabilitiesPironti, J.P. et al. | 2011
- 22
-
Applying a Technological Integration Decision Framework to Innovation GovernanceDavis, Robert E. et al. | 2018
- 22
-
The Role of the CISO and the Digital Security LandscapePutrus, Robert et al. | 2019
- 24
-
Creating Assurance in BlockchainSmith, A. Michael et al. | 2017
- 24
-
Using Standards to Create Effect in the BoardroomKoning, E. / Bikker, H. et al. | 2013
- 24
-
Essential Frameworks and Methodologies to Maximize the Value of ITRenard, Laurent et al. | 2016
- 24
-
Strategic Alignment and E-health GovernanceBeratarbide, Elena / Kelsey, Thomas W. / Gil, Hermenegildo et al. | 2015
- 25
-
Auditing Oracle Databases Using CAATsCooke, I. et al. | 2014
- 25
-
Strengthening Information Security GovernanceGelbstein, E. et al. | 2012
- 27
-
Agile AuditAlexiou, Spiros et al. | 2017
- 27
-
The Struggle for Privacy and the Survival of the Secured in the IT EcosystemSathiyamurthy, S. et al. | 2011
- 28
-
Cloud InsecuritiesWlosinski, Larry G. et al. | 2015
- 28
-
Governance, Risk and Compliance-Tying It All TogetherPierre-Louis, S. / Sanchez, R. / Shek, M. et al. | 2013
- 28
-
Information Security Architecture Gap Assessment and PrioritizationGhaznavi-Zadeh, Rassoul et al. | 2018
- 29
-
Auditing Cyberinsurance PolicyOlakunle, J. et al. | 2014
- 30
-
Sponsored Feature: Why Security Product Investments Are Not WorkingKeef, Sean et al. | 2019
- 31
-
Optimizing Software Development With Lean Value Chain AnalysisMani, Vimal et al. | 2016
- 31
-
Sharing or Controlling? Examining the Decision to Segregate Information Within the OrganizationFoerster, C.A. et al. | 2012
- 32
-
Stop Looking for the Purple Squirrel: What's Wrong With Today's Cybersecurity Hiring PracticesLee, Marcelle et al. | 2019
- 33
-
Selected COBIT 5 Processes for Essential Enterprise SecurityGreene, Fredric et al. | 2015
- 33
-
Critical Information Systems ProcessesYildirim, T. / Metin, B. et al. | 2014
- 34
-
Sponsored Feature: Centralized, Model-Driven Visibility Key to IT-OT Security ManagementDavidson, Ron et al. | 2018
- 34
-
Quick Fixes for Improving CyberdefensesAgarwala, Sanjiv et al. | 2016
- 34
-
Common Myths of Service Organization Controls (SOC) ReportsSeshadri, D. et al. | 2013
- 35
-
Value Assessment Tool for ICT Projects at the European CommissionDzhumalieva, S. / Noell, F. / Baudu, S. et al. | 2011
- 36
-
The Missing Link in Assessing Cyberrisk Factors Through Supply ChainsEitan, Ofir et al. | 2018
- 36
-
Dealing With Difficult DataHoesing, Michael T. et al. | 2017
- 36
-
Evaluating Information Security SolutionsAnderson, Kerry A. et al. | 2015
- 36
-
Mitigating the Risk of OSS-based DevelopmentGold, C. et al. | 2012
- 37
-
Application Security RiskShubhamangala, B. R. / Saha, Snehanshu et al. | 2016
- 37
-
ISO/IEC 27001:2005 Implementation and Certification-Doing It Again and AgainOdeshina, N. et al. | 2013
- 37
-
The Effect of the COSO 2013 Update on IS ProfessionalsWhite, J.H. et al. | 2014
- 37
-
The Two Key Challenges of GDPR AdoptionSerres, Ramón et al. | 2019
- 39
-
Corporate Responsibility, Retaining Top Management CommitmentDubey, N. et al. | 2013
- 40
-
A Case for a Partnership Between Information Security and Records Information ManagementAnderson, K.A. et al. | 2012
- 41
-
Another Win for Global Consumer Data RightsBrunswick, Dave et al. | 2019
- 41
-
A Practical Approach to Continuous Controls MonitoringVohradsky, David et al. | 2015
- 42
-
Internal Audit's Contribution to the Effectiveness of Information Security (Part 1)Steinbart, P.J. / Raschke, R. / Gal, G. / Dilla, W.N. et al. | 2014
- 42
-
Why Cyber Insurance Needs Probabilistic and Statistical Cyberrisk Assessments More Than EverAtluri, Indrajit et al. | 2018
- 43
-
Securing Merchant Environments Is Good, Securing the Credit Card Itself Is BetterAlaswad, A. et al. | 2013
- 45
-
An Introduction to ICT Continuity Based on BS 25777Hamidovic, H. et al. | 2011
- 45
-
Fundamental Concepts of IT Security AssuranceHarnidovic, H. et al. | 2012
- 45
-
Standardized Scoring for Security and Risk MetricsPareek, Mukul et al. | 2017
- 45
-
How to Increase Cybersecurity AwarenessNachin, Nipon / Tangmanee, Chatpong / Piromsopa, Krerk et al. | 2019
- 46
-
A Nontraditional Approach to Prioritizing and Justifying Cybersecurity InvestmentsPutrus, Robert et al. | 2016
- 47
-
Why Should Organizations Care About Professional Certifications?Smart, B. et al. | 2013
- 48
-
Why Computer Ethics Matters to Computer AuditingLee, W.W. et al. | 2014
- 48
-
Checking the Maturity of Security Policies for Information and CommunicationLyra, Mauricio Rocha et al. | 2015
- 51
-
How Root Cause Analysis Fits Into Various Audit TypesDurmisevic-Mutapcic, Amra et al. | 2019
- 52
-
Tools: Five Linux Distributions With Tools for AuditMoyle, Ed et al. | 2018
- 53
-
Aligning Information Security With Enterprise Risk Management Using ISO/IEC 27001:2013Mani, V. et al. | 2014
- 54
-
HelpSource Q&ABakshi, Sunil et al. | 2018
- 54
-
Tools: Tools You May Already Have That Add Assurance ValueMoyle, Ed et al. | 2017
- 59
-
Standards, Guidelines, Tools and Techniques| 2015
- S1
-
ISACA Bookstore Supplement| 2015