Information Security Matters: How We Can Succeed (Englisch)
- Neue Suche nach: Ross, Steven J.
- Neue Suche nach: Ross, Steven J.
In:
ISACA journal
;
6
;
3-5
;
2018
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Information Security Matters: How We Can Succeed
-
Beteiligte:Ross, Steven J. ( Autor:in )
-
Erschienen in:ISACA journal ; 6 ; 3-5
-
Verlag:
- Neue Suche nach: Information Systems Audit and Control Association
-
Erscheinungsdatum:01.01.2018
-
Format / Umfang:3 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.450285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.450285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 6
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Information Security Matters: How We Can SucceedRoss, Steven J. et al. | 2018
- 3
-
Information Security Matters: Information Security in ContextRoss, Steven J. et al. | 2017
- 3
-
Information Security Matters: Cybersecurity for a Simple'' AuditorRoss, Steven J. et al. | 2015
- 4
-
Information Security Matters: Service Availability and Disaster RecoveryRoss, S.J. et al. | 2010
- 4
-
Information Security Matters: The G7 and Cyber SecurityRoss, Steven J. et al. | 2016
- 4
-
Information Security Matters: Whiz Bang 2000Ross, Steven J. et al. | 2014
- 4
-
Information Security Matters: A Tide in the AffairsRoss, S.J. et al. | 2013
- 4
-
Information Security Matters: The Cost of CyberattacksRoss, S.J. et al. | 2012
- 5
-
IS Audit Basics: Auditors and Large Software Projects, Part 3Gelbstein, Ed et al. | 2015
- 6
-
The NetworkStetz, Kathleen M. et al. | 2014
- 6
-
IS Audit Basics: Affect What Is Next NowCooke, Ian / Belt, Green / Cullen, Martin et al. | 2018
- 6
-
Information Ethics: Character Traits of an IT ProfessionalRaval, V. et al. | 2013
- 6
-
IS Audit Basics: Auditing Mobile DevicesCooke, Ian et al. | 2017
- 6
-
Cloud Computing: Leveraging the Cloud for Added ValueMarkey, S.C. et al. | 2012
- 7
-
IS Audit Basics: The Soft Skills Challenge, Part 6Gelbstein, Ed / Baldi, Stefano et al. | 2016
- 8
-
Information Ethics: Risk and ResponsibilityRaval, V. et al. | 2012
- 8
-
Information Ethics: An Alchemy of C3: Character, College and ComputersRaval, Vasant et al. | 2014
- 10
-
Information Ethics: Transparency and the IT ProfessionalRaval, Vasant et al. | 2015
- 10
-
The Practical Aspect: Why Worry About IoT?Raval, Vasant / Thaker, Ranjit D. et al. | 2018
- 10
-
Five Questions WithSebopeng, R.B. et al. | 2013
- 11
-
IS Audit Basics: The Core of IT AuditingSingleton, Tommie et al. | 2014
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Proper Segregation of Incompatible IT ActivitiesSingleton, T.W. et al. | 2012
- 12
-
IT Audit Basics: What Every IT Auditor Should Know About Data AnalyticsSingleton, T. et al. | 2013
- 12
-
Access Control, Security, and Trust: A Logical ApproachSpinelli, C. et al. | 2011
- 13
-
Book Review: Security, Audit and Control Features Oracle E-Business Suite, 3^r^d EditionBenmahbous, M. et al. | 2010
- 13
-
Green IT in Practice: How One Company Is Approaching the Greening of its ITMunongwa, B. et al. | 2011
- 14
-
Persistent Cross-interface AttacksSood, A.K. / Enbody, R.J. et al. | 2011
- 14
-
Information Ethics: Information Ethics in the Mid-21st CenturyRaval, Vasant et al. | 2016
- 14
-
The Practical Aspect: Challenges of Security Log ManagementRaval, Vasant / Verma, Saloni et al. | 2017
- 14
-
Criteria for Evaluating and Selecting Continuous Controls Monitoring SolutionsDutta, A. / Koritala, B. et al. | 2010
- 14
-
Cloud Computing: Cloud Computing as an Enabler of New Business Models and Start-upsSchouten, Angelique et al. | 2015
- 14
-
How Zero-trust Network Security Can Enable Recovery From CyberattacksBeck, Eric A. et al. | 2014
- 15
-
Book Review: The Web Application Hacker's Handbook Finding and Exploiting Security Flaws, 2^n^d EditionParekh, U. et al. | 2013
- 16
-
Information Insecurity-Motivator of Corporate Compliance PracticeCano, J.J. et al. | 2013
- 16
-
Future-Proofing a Career in Cybersecurity ([non-Roman script word])Saurbaugh, Mike et al. | 2018
- 17
-
Book Review: Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsRichardson, Andrew et al. | 2015
- 17
-
Demonstrating Due Diligence in the Management of Information SecurityGelbstein, E. et al. | 2012
- 17
-
Data Governance for Privacy, Confidentiality and Compliance: A Holistic ApproachSalido, J. et al. | 2010
- 18
-
The Criticality of Security in the Internet of ThingsHerold, Rebecca et al. | 2015
- 19
-
Leveraging Industry Standards to Address Industrial Cybersecurity RiskAlcoforado, Ivan et al. | 2014
- 19
-
Digital Identity—Will the New Oil Create Fuel or Fire in Today's Economy?Blum, Dan et al. | 2017
- 20
-
Is Artificial Intelligence a Career Path for You? ([non-Roman script word])Wlosinski, Larry G. et al. | 2018
- 20
-
Data Integrity-Information Security's Poor RelationGelbstein, E. et al. | 2011
- 20
-
Security Labeling of IT Services Using a Rating MethodologyRamos, A. et al. | 2013
- 21
-
Performance Measurement Metrics for IT GovernanceBakshi, Sunil et al. | 2016
- 21
-
Lack of Privacy Awareness in Social NetworksSrinivasan, S. et al. | 2012
- 22
-
Governance, Risk, Compliance and a Big Data Case StudyPearce, Guy et al. | 2017
- 24
-
An Integrated Risk Assessment Program-A Cliche or a Need?Azam, S.F. et al. | 2013
- 24
-
Show Me the Money! Three Ways to Better Partner With FinanceBarnier, B.G. et al. | 2010
- 25
-
Bridging the Gap Between Access and Security in Big DataMattsson, Ulf T. et al. | 2014
- 25
-
Back to the Future in Device SecurityRotman, Doron / Kypreos, Chris / Pipes, Sarah et al. | 2015
- 26
-
Preventive Technical Controls for Application SecuritySethi, R. / Foroughi, E. et al. | 2012
- 26
-
Technology Risk Measurement and ReportingPareek, M. et al. | 2011
- 27
-
Leading Information SecurityJulisch, K. et al. | 2013
- 28
-
Effective Strategies for Creating and Maintaining a Diverse and Inclusive IT Audit TeamBalderas, Julie / Fareeduddin, Asim / Richards, Femi / Sarmad, Ruwel / Wall, Jack et al. | 2018
- 29
-
An Introduction to Digital Records ManagementHamidovic, H. et al. | 2010
- 29
-
Assessing Security ControlsDubsky, Lance et al. | 2016
- 29
-
The Changing Face of CybersecurityHayes, S. / Shore, M. / Jakeman, M. et al. | 2012
- 29
-
Auditing Big Data in EnterprisesAl-Mansour, Abdullah et al. | 2017
- 30
-
Data Owners' Responsibilities When Migrating to the CloudGelbstein, Ed / Polic, Viktor et al. | 2014
- 31
-
Doing Business in India Requires Digital ComplianceVaidya, A. et al. | 2013
- 32
-
Choosing the Most Appropriate Data Security Solution for an OrganizationMattsson, U. et al. | 2011
- 33
-
Delivering Personal Data Protection Compliance on a Global ScaleKabanov, Ilya et al. | 2016
- 33
-
A Risk-Based Management Approach to Third-Party Data Security, Risk and CompliancePutrus, Robert et al. | 2017
- 33
-
Internet of Things—The Fate We Make for OurselvesSeaman, Jim et al. | 2015
- 35
-
Building a Business Case for Records ManagementStrait, C. et al. | 2010
- 36
-
From Here to Maturity—Managing the Information Security Life CycleAnderson, Kerry A. et al. | 2014
- 37
-
SME Cybersecurity and the Three Little PigsHan, D.R. et al. | 2012
- 37
-
Growing a Cybersecurity CareerCasesa, Philip et al. | 2018
- 37
-
Revisiting the Human Factor in Organizational Information Security ManagementGuo, K.H. et al. | 2013
- 38
-
IT Governance and Business-IT Alignment in SMEsDe Haes, S. / Haest, R. / Van Grembergen, W. et al. | 2010
- 38
-
Developing a Unified Approach to Information Security in Business Associate RelationshipsOverly, M.R. / Howell, C.T. / Scarano, R.M. et al. | 2011
- 38
-
Revising Cybersecurity Skills for EnterprisesIvanovs, Ivo / Deruma, Sintija et al. | 2015
- 39
-
Enhancing the Audit Follow-up Process Using COBIT 5Cooke, Ian et al. | 2016
- 41
-
Defining the Chief Digital Officer Using COBIT 5Catarino, João / Rosa, Isabel / da Silva, Miguel Mira et al. | 2018
- 42
-
A Sustainable and Efficient Way to Meet Client's Growing Security ExpectationsKulkami, B. et al. | 2013
- 42
-
Making the SoA an Information Security Governance ToolGnana, Daniel et al. | 2017
- 42
-
A Business-Integrated Approach to Incident ResponseMukundhan, Hari et al. | 2015
- 43
-
Using Scenario Analysis for Managing Technology RiskPareek, M. et al. | 2012
- 44
-
Auditing Oracle DatabaseRahman, Muhammad Mushfiqur et al. | 2014
- 45
-
A Higher Level of Governance-Monitoring IT Internal ControlsGarber, M. et al. | 2010
- 46
-
Auditing Global Compliance of Data Protection MechanismsLehmann, D. / van Vonderen, F. et al. | 2011
- 46
-
The Criticality of Mobile Device ManagementAhmed, A. et al. | 2013
- 47
-
Advanced Data Analytics for IT AuditorsAlexiou, Spiros et al. | 2016
- 47
-
Real-life Risk TheoryBrottmann, Mette / Agnoletti, Klaus / Pedersen, Morten Als / Madsen, Ronnie Lykke / Krumbak, Michael Rosendal / Ahrends, Thor et al. | 2015
- 48
-
Evasive Malware TricksKolbitsch, Clemens et al. | 2017
- 49
-
A Heightened Sense of AwarenessCassels, Wade / Alvero, Kevin / Pierson, Randy et al. | 2018
- 49
-
Preparing for HTML5 Capabilities and ThreatsZhang, H. et al. | 2012
- 50
-
Risk and Ethics in CyberspaceLee, Wanbil W. et al. | 2015
- 51
-
The Information Security FunctionCano, Jeimy J. et al. | 2014
- 52
-
The AICPA's New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key StakeholdersHerrygers, Sandra / Kumar, Gaurav / Schaeffer, Jeff et al. | 2017
- 54
-
Tools: Skill Acquisition in a Rapidly Evolving WorkplaceLyons, Robin et al. | 2018