Governance Implementation-COBIT 5 and ISO (English)
- New search for: Marks, L.
- New search for: Marks, L.
In:
ISACA JOURNAL
;
1
;
17-23
;
2013
-
ISSN:
- Article (Journal) / Print
-
Title:Governance Implementation-COBIT 5 and ISO
-
Contributors:Marks, L. ( author )
-
Published in:ISACA JOURNAL ; 1 ; 17-23
-
Publisher:
- New search for: Information Systems Audit and Control Association
-
Publication date:2013-01-01
-
Size:7 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.450285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.450285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: Managing Availability in the Multi-Modal EraRoss, Steven J. et al. | 2018
- 3
-
Information Security Matters: Extra, Extra, Read All About ItRoss, S.J. et al. | 2014
- 4
-
Information Security Matters: Microwave SoftwareRoss, S.J. et al. | 2015
- 4
-
Information Security Matters: A Fundamental QuestionRoss, S.J. et al. | 2011
- 4
-
Guest Editorial: Forget the Governance! What to Do When the CEO Says `Get It Done!'Guldentops, E. et al. | 2013
- 4
-
Information Security Matters: State-on-state CyberconflictsRoss, Steven J. et al. | 2017
- 4
-
Information Security Matters: A Room With MachinesRoss, S.J. et al. | 2012
- 4
-
Information Security Matters: Fifty Years of Information SecurityRoss, Steven J. et al. | 2019
- 5
-
Information Security Matters: Mean TimesRoss, S.J. et al. | 2013
- 5
-
Cloud Computing: Process Automation From the CloudRauscher, J. et al. | 2014
- 6
-
Guest Editorial: Monitoring From the Cloud-Insights on DemandCangemi, M.P. et al. | 2015
- 6
-
IS Audit Basics: Backup and RecoveryCooke, Ian et al. | 2018
- 6
-
Cloud Computing: Securing Cloud-based ApplicationsMendelsohn, M. / Philipovitch, A. / Welch, W. / Zanella, R. et al. | 2012
- 7
-
IT Audit Basics: How the IT Auditor Can Make Substantive Contributions to a Financial AuditSingleton, T.W. et al. | 2011
- 7
-
Cloud Computing: Shifting the Focus to Long-term, Value-add Projects With a Cloud EnvironmentPirooz, S. et al. | 2013
- 7
-
IS Audit Basics: Assurance Considerations for Ongoing GDPR ConformanceCooke, Ian et al. | 2019
- 7
-
IS Audit Basics: Understanding the Cybercrime WaveSingleton, T. et al. | 2014
- 8
-
IS Audit Basics: Preparing for Auditing New Risk, Part 1Gelbstein, Ed et al. | 2017
- 8
-
The NetworkHeikkinen, T. et al. | 2015
- 9
-
IT Audit Basics: Evaluating Access Controls Over DataSingleton, T.W. et al. | 2012
- 10
-
IS Audit Basics: Perspectives From a Seasoned PractitionerGelbstein, E. et al. | 2015
- 10
-
IT Audit Basics: How to Properly Audit a Client Who Uses a Service Organization-SOC Report or No SOC ReportSingleton, T.W. et al. | 2013
- 10
-
Five Questions WithFeinman, T. et al. | 2011
- 12
-
Cloud Computing: Are Your Data Secure in the Cloud?Nye, J. et al. | 2015
- 12
-
Book Review: IT Governance for CEOs and Members of the BoardEtea, I.K. et al. | 2014
- 13
-
Book Review: Big Data: A Revolution That Will Transform How We Live, Work, and ThinkParekh, U. et al. | 2014
- 13
-
Cloudifying Threats—Understanding Cloud App Attacks and DefensesSood, Aditya K. / Jalil, Rehan et al. | 2018
- 14
-
The Automation ConundrumZongo, Phillimon et al. | 2017
- 14
-
SCADA Cybersecurity FrameworkMalaviya, S. et al. | 2014
- 14
-
Data Privacy, Data Protection and the Importance of Integration for GDPR ComplianceBrunswick, Dave et al. | 2019
- 14
-
Database Backup and Recovery Best PracticesAkhtar, A.N. / Buchholtz, J. / Ryan, M. / Setty, K. et al. | 2012
- 16
-
Book Review: Cybersecurity and Cyberwar: What Everyone Needs to KnowMarks, L. et al. | 2015
- 16
-
Book Review: IT Governance: A Pocket GuideSule, D. et al. | 2013
- 16
-
Auditing Security Risks in Virtual IT SystemsChaudhuri, A. / von Solms, S.H. / Chaudhuri, D. et al. | 2011
- 17
-
Governance Implementation-COBIT 5 and ISOMarks, L. et al. | 2013
- 17
-
Book Review: Secure: Insights From the People Who Keep Information SafeKivisild, A.K. et al. | 2015
- 18
-
NIST's New Password Rule BookFulmer, Bachman / Walters, Melissa / Arnold, Bill et al. | 2019
- 18
-
Effective Cyberthreat Management Evolution and BeyondSehgal, S. et al. | 2015
- 19
-
Key Considerations in Protecting Sensitive Data Leakage Using Date Loss Prevention ToolsKumaresan, N. et al. | 2014
- 20
-
Key Issues, Challenges and Resolutions in Implementing Business Continuity ProjectsTammineedi, R.L.S. et al. | 2012
- 22
-
Implementing an Information Security Continuous Monitoring Solution-A Case StudyLuu, T. et al. | 2015
- 22
-
Phishing Detection and Loss Computation Hybrid ModelBiswas, Baidyanath / Mukhopadhyay, Arunabha et al. | 2017
- 23
-
Mistakes Happen! Mitigating Unintentional Data LossVan Stone, Mike / Halpert, Ben et al. | 2018
- 24
-
Effective IT Governance Through the Three Lines of Defense, Risk IT and COBITOyemade, R. et al. | 2012
- 24
-
Challenges and Benefits of Migrating to COBIT 5 in the Strongly Regulated Environment of EU Agricultural Paying AgenciesArcidlacono, G. et al. | 2014
- 24
-
IT Policy Framework Based on COBIT 5Carrillo, J. et al. | 2013
- 24
-
The Road to GDPR ComplianceBarclay, Corlane et al. | 2019
- 26
-
A Young Professional's Guide to Career Success Using Soft SkillsKandra, M. / Sewell, T. / Nyamari, J. et al. | 2011
- 27
-
Auditing for PII Security ComplianceMohammed, D. et al. | 2014
- 28
-
Influence of International Best Practices on the South African Public Service's Corporate Governance of ICTvan der Walt, T. / Coetsee, A.D. / von Solms, S.H. et al. | 2013
- 29
-
User Threats Vs. User PrivacyVlachos, D. et al. | 2015
- 30
-
Applying AI in Application SecurityMaraju, Kiran et al. | 2018
- 30
-
Information Risk Management for Supporting a Basel II InitiativeDutta, A. / Sista, P. et al. | 2012
- 30
-
Sponsored Feature: Why Attackers Are Turning Their Attention Toward ERP ApplicationsPerez-Etchegoyen, Juan Pablo et al. | 2019
- 31
-
Understanding Software Metric UseHenderson, D. / Sheetz, S.D. / Wallace, L. et al. | 2015
- 31
-
Chain Exploitation-Social Networks MalwareSood, A.K. / Enbody, R. et al. | 2011
- 31
-
Sponsored Feature: Indicators of Exposure and Attack Surface VisualizationCircus, Ravid et al. | 2017
- 31
-
Risk Management in 4G LTEBhasker, D. et al. | 2014
- 32
-
Reporting on GDPR Compliance to the BoardPearce, Guy et al. | 2019
- 33
-
Creating the Business Case for ERP System Acquisitions Using GEITZoughbi, G. et al. | 2013
- 36
-
Meeting Security and Compliance Requirements Efficiently With TokenizationBeiseel, S. et al. | 2014
- 37
-
Big Data Deidentification, Reidentification and AnonymizationKhan, Mohammed J. et al. | 2018
- 37
-
A Machine Learning Approach for Telemedicine GovernancePal, Shounak / Mukhopadhyay, Arunabha et al. | 2017
- 38
-
Simplify and Layer Your Security Approach to Protect Card DataHorton, T. et al. | 2011
- 38
-
Auditing SQL Server Databases Using CAATsCooke, I. et al. | 2015
- 38
-
The Devil's in the DetailsDavis, S. / Ferrell, P. / Scranton, S. / Millar, P. et al. | 2012
- 39
-
BYOD Security Considerations of Full Mobility and Third-party Cloud ComputingYu, W.E. et al. | 2013
- 40
-
The Optimal Risk Management FrameworkMarks, Larry et al. | 2019
- 42
-
Incorporating COBIT Best Practices in PCI DSS V2.0 for Effective ComplianceNicho, M. et al. | 2012
- 42
-
The Machine Learning Audit—CRISP-DM FrameworkClark, Andrew et al. | 2018
- 42
-
Privacy Audit-Methodology and Related ConsiderationsRiffat, M. et al. | 2014
- 43
-
Audit Accounting Data Using Excel Pivot TablesFilzen, J.J. / Simkin, M.G. et al. | 2015
- 43
-
IT Governance Implementation-Formulating and Presenting Practical Business CasesBhatia, R. et al. | 2013
- 43
-
Information Security From a Business Perspective: A Lottery Sector Case StudyDimitriadis, C.K. et al. | 2011
- 46
-
Building and Maintaining Effective Mechanisms for Implementing IT GovernanceRobinson, I. / Jodha, M. et al. | 2013
- 46
-
Unlocking Hidden Value in ERP System Acquisitions Using Risk ManagementZoughbi, G. et al. | 2014
- 46
-
Smashing the Information Security Policy for Fun and ProfitDavid Eduardo Acosta, R. et al. | 2017
- 46
-
The Four Questions for Successful DLP ImplementationNanchengwa, Christopher et al. | 2019
- 48
-
Implementation of Big Data in Commercial BanksAkanni, Adeniyi et al. | 2018
- 49
-
Information Security Continuous MonitoringHargenrader, B. et al. | 2015
- 49
-
The Modernization Problem, Part 1Henry, K. et al. | 2013
- 52
-
Using Open Source Tools to Support Technology GovernanceMoyle, Ed et al. | 2017
- 52
-
Tools: Data Protection ToolsMoyle, Ed et al. | 2018
- 52
-
Crossword PuzzleMellor, M. et al. | 2013
- 53
-
CPE Quiz #146 Based on Volume 5, 2012Chan, S. et al. | 2013