Information Security Matters: Information Security in Context (English)

in ISACA journal ; 6 ; 3-5
ISACA journal

Document information

  • Title:
    Information Security Matters: Information Security in Context
  • Author / Creator:
  • Journal / Series:
  • Volume:
    6
  • Page:
    3-5
  • Publisher:
    Information Systems Audit and Control Association
  • Year of publication:
    2017
  • Size:
    3 pages
  • ISSN:
  • Type of media:
    Article (Journal)
  • Type of material:
    Print
  • Language:
    English
  • Classification:
    DDC:    657.450285

Table of contents – Volume 6

Show all volumes and issues

Tables of content are generated automatically and are based on records of articles contained that are available in the TIB-Portal index. Due to missing records of articles, the volume display may be incomplete, even though the whole journal is available at TIB.

3
Information Security Matters: Cybersecurity for a Simple'' Auditor
Ross, Steven J. | 2015
3
Information Security Matters: Information Security in Context
Ross, Steven J. | 2017
3
Information Security Matters: How We Can Succeed
Ross, Steven J. | 2018
4
Information Security Matters: Service Availability and Disaster Recovery
Ross, S.J. | 2010
4
Information Security Matters: The G7 and Cyber Security
Ross, Steven J. | 2016
4
Information Security Matters: The Cost of Cyberattacks
Ross, S.J. | 2012
4
Information Security Matters: A Tide in the Affairs
Ross, S.J. | 2013
4
Information Security Matters: Whiz Bang 2000
Ross, Steven J. | 2014
5
IS Audit Basics: Auditors and Large Software Projects, Part 3
Gelbstein, Ed | 2015
6
Cloud Computing: Leveraging the Cloud for Added Value
Markey, S.C. | 2012
6
IS Audit Basics: Affect What Is Next Now
Cooke, Ian / Belt, Green / Cullen, Martin | 2018
6
The Network
Stetz, Kathleen M. | 2014
6
IS Audit Basics: Auditing Mobile Devices
Cooke, Ian | 2017
6
Information Ethics: Character Traits of an IT Professional
Raval, V. | 2013
7
IS Audit Basics: The Soft Skills Challenge, Part 6
Gelbstein, Ed / Baldi, Stefano | 2016
8
Information Ethics: Risk and Responsibility
Raval, V. | 2012
8
Information Ethics: An Alchemy of C3: Character, College and Computers
Raval, Vasant | 2014
10
Information Ethics: Transparency and the IT Professional
Raval, Vasant | 2015
10
Five Questions With
Sebopeng, R.B. | 2013
10
The Practical Aspect: Why Worry About IoT?
Raval, Vasant / Thaker, Ranjit D. | 2018
11
IS Audit Basics: The Core of IT Auditing
Singleton, Tommie | 2014
12
IT Audit Basics: What Every IT Auditor Should Know About Data Analytics
Singleton, T. | 2013
12
IT Audit Basics: What Every IT Auditor Should Know About Proper Segregation of Incompatible IT Activities
Singleton, T.W. | 2012
12
Access Control, Security, and Trust: A Logical Approach
Spinelli, C. | 2011
13
Green IT in Practice: How One Company Is Approaching the Greening of its IT
Munongwa, B. | 2011
13
Book Review: Security, Audit and Control Features Oracle E-Business Suite, 3^r^d Edition
Benmahbous, M. | 2010
14
Cloud Computing: Cloud Computing as an Enabler of New Business Models and Start-ups
Schouten, Angelique | 2015
14
How Zero-trust Network Security Can Enable Recovery From Cyberattacks
Beck, Eric A. | 2014
14
Criteria for Evaluating and Selecting Continuous Controls Monitoring Solutions
Dutta, A. / Koritala, B. | 2010
14
Information Ethics: Information Ethics in the Mid-21st Century
Raval, Vasant | 2016
14
The Practical Aspect: Challenges of Security Log Management
Raval, Vasant / Verma, Saloni | 2017
14
Persistent Cross-interface Attacks
Sood, A.K. / Enbody, R.J. | 2011
15
Book Review: The Web Application Hacker's Handbook Finding and Exploiting Security Flaws, 2^n^d Edition
Parekh, U. | 2013
16
Information Insecurity-Motivator of Corporate Compliance Practice
Cano, J.J. | 2013
16
Future-Proofing a Career in Cybersecurity ([non-Roman script word])
Saurbaugh, Mike | 2018
17
Data Governance for Privacy, Confidentiality and Compliance: A Holistic Approach
Salido, J. | 2010
17
Book Review: Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Richardson, Andrew | 2015
17
Demonstrating Due Diligence in the Management of Information Security
Gelbstein, E. | 2012
18
The Criticality of Security in the Internet of Things
Herold, Rebecca | 2015
19
Digital Identity—Will the New Oil Create Fuel or Fire in Today's Economy?
Blum, Dan | 2017
19
Leveraging Industry Standards to Address Industrial Cybersecurity Risk
Alcoforado, Ivan | 2014
20
Security Labeling of IT Services Using a Rating Methodology
Ramos, A. | 2013
20
Is Artificial Intelligence a Career Path for You? ([non-Roman script word])
Wlosinski, Larry G. | 2018
20
Data Integrity-Information Security's Poor Relation
Gelbstein, E. | 2011
21
Lack of Privacy Awareness in Social Networks
Srinivasan, S. | 2012
21
Performance Measurement Metrics for IT Governance
Bakshi, Sunil | 2016
22
Governance, Risk, Compliance and a Big Data Case Study
Pearce, Guy | 2017
24
Show Me the Money! Three Ways to Better Partner With Finance
Barnier, B.G. | 2010
24
An Integrated Risk Assessment Program-A Cliche or a Need?
Azam, S.F. | 2013
25
Back to the Future in Device Security
Rotman, Doron / Kypreos, Chris / Pipes, Sarah | 2015
25
Bridging the Gap Between Access and Security in Big Data
Mattsson, Ulf T. | 2014
26
Technology Risk Measurement and Reporting
Pareek, M. | 2011
26
Preventive Technical Controls for Application Security
Sethi, R. / Foroughi, E. | 2012
27
Leading Information Security
Julisch, K. | 2013
28
Effective Strategies for Creating and Maintaining a Diverse and Inclusive IT Audit Team
Balderas, Julie / Fareeduddin, Asim / Richards, Femi / Sarmad, Ruwel / Wall, Jack | 2018
29
The Changing Face of Cybersecurity
Hayes, S. / Shore, M. / Jakeman, M. | 2012
29
Assessing Security Controls
Dubsky, Lance | 2016
29
An Introduction to Digital Records Management
Hamidovic, H. | 2010
29
Auditing Big Data in Enterprises
Al-Mansour, Abdullah | 2017
30
Data Owners' Responsibilities When Migrating to the Cloud
Gelbstein, Ed / Polic, Viktor | 2014
31
Doing Business in India Requires Digital Compliance
Vaidya, A. | 2013
32
Choosing the Most Appropriate Data Security Solution for an Organization
Mattsson, U. | 2011
33
Internet of Things—The Fate We Make for Ourselves
Seaman, Jim | 2015
33
Delivering Personal Data Protection Compliance on a Global Scale
Kabanov, Ilya | 2016
33
A Risk-Based Management Approach to Third-Party Data Security, Risk and Compliance
Putrus, Robert | 2017
35
Building a Business Case for Records Management
Strait, C. | 2010
36
From Here to Maturity—Managing the Information Security Life Cycle
Anderson, Kerry A. | 2014
37
Revisiting the Human Factor in Organizational Information Security Management
Guo, K.H. | 2013
37
Growing a Cybersecurity Career
Casesa, Philip | 2018
37
SME Cybersecurity and the Three Little Pigs
Han, D.R. | 2012
38
IT Governance and Business-IT Alignment in SMEs
De Haes, S. / Haest, R. / Van Grembergen, W. | 2010
38
Revising Cybersecurity Skills for Enterprises
Ivanovs, Ivo / Deruma, Sintija | 2015
38
Developing a Unified Approach to Information Security in Business Associate Relationships
Overly, M.R. / Howell, C.T. / Scarano, R.M. | 2011
39
Enhancing the Audit Follow-up Process Using COBIT 5
Cooke, Ian | 2016
41
Defining the Chief Digital Officer Using COBIT 5
Catarino, João / Rosa, Isabel / da Silva, Miguel Mira | 2018
42
A Business-Integrated Approach to Incident Response
Mukundhan, Hari | 2015
42
Making the SoA an Information Security Governance Tool
Gnana, Daniel | 2017
42
A Sustainable and Efficient Way to Meet Client's Growing Security Expectations
Kulkami, B. | 2013
43
Using Scenario Analysis for Managing Technology Risk
Pareek, M. | 2012
44
Auditing Oracle Database
Rahman, Muhammad Mushfiqur | 2014
45
A Higher Level of Governance-Monitoring IT Internal Controls
Garber, M. | 2010
46
The Criticality of Mobile Device Management
Ahmed, A. | 2013
46
Auditing Global Compliance of Data Protection Mechanisms
Lehmann, D. / van Vonderen, F. | 2011
47
Real-life Risk Theory
Brottmann, Mette / Agnoletti, Klaus / Pedersen, Morten Als / Madsen, Ronnie Lykke / Krumbak, Michael Rosendal / Ahrends, Thor | 2015
47
Advanced Data Analytics for IT Auditors
Alexiou, Spiros | 2016
48
Evasive Malware Tricks
Kolbitsch, Clemens | 2017
49
A Heightened Sense of Awareness
Cassels, Wade / Alvero, Kevin / Pierson, Randy | 2018
49
Preparing for HTML5 Capabilities and Threats
Zhang, H. | 2012
50
Risk and Ethics in Cyberspace
Lee, Wanbil W. | 2015
51
The Information Security Function
Cano, Jeimy J. | 2014
52
The AICPA's New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key Stakeholders
Herrygers, Sandra / Kumar, Gaurav / Schaeffer, Jeff | 2017
54
Tools: Skill Acquisition in a Rapidly Evolving Workplace
Lyons, Robin | 2018

Similar titles