The Missing Link in Assessing Cyberrisk Factors Through Supply Chains (English)
- New search for: Eitan, Ofir
- New search for: Eitan, Ofir
In:
ISACA journal
;
2
;
36-41
;
2018
-
ISSN:
- Article (Journal) / Print
-
Title:The Missing Link in Assessing Cyberrisk Factors Through Supply Chains
-
Contributors:Eitan, Ofir ( author )
-
Published in:ISACA journal ; 2 ; 36-41
-
Publisher:
- New search for: Information Systems Audit and Control Association
-
Publication date:2018-01-01
-
Size:6 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.450285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.450285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: Do You Need a Disaster Recovery Plan...?Ross, Steven J. et al. | 2017
- 3
-
Information Security Matters: Disaster Recovery Management in the Multi-Modal EraRoss, Steven J. et al. | 2018
- 4
-
Looking Back: Information Security MattersRoss, S.J. et al. | 2014
- 4
-
Information Security Matters: What Is Information Security Worth?Ross, Steven J. et al. | 2019
- 4
-
Information Security Matters: Weary Willie's Guide to Cyberrisk ManagementRoss, Steven J. et al. | 2016
- 4
-
Making Preparedness PayRoss, S.J. et al. | 2012
- 4
-
Information Security Matters: What Is the Value of Security?Ross, S.J. et al. | 2011
- 4
-
Information Security Matters: CyberwhatsitRoss, Steven J. et al. | 2015
- 6
-
IS Audit Basics: Innovation in the IT Audit ProcessCooke, Ian et al. | 2018
- 6
-
The NetworkQuinlan, George et al. | 2016
- 6
-
IS Audit Basics: The Auditors, IS/IT Policies and ComplianceGelbstein, Ed et al. | 2017
- 6
-
Gates Corporation Makes Sales a Companywide Effort in the CloudBerridge, E. et al. | 2012
- 6
-
IT Audit Basics: Understanding the New SOC ReportsSingleton, T.W. et al. | 2011
- 6
-
Information Security Matters: Shedding TiersRoss, S.J. et al. | 2014
- 7
-
IS Audit Basics: Auditing CybersecurityCooke, Ian et al. | 2019
- 8
-
IS Audit Basics: Is There Such a Thing as a Bad IS Auditor?, Part 2Gelbstein, Ed et al. | 2016
- 8
-
Changing Times and the Eternality of EthicsRaval, V. et al. | 2012
- 10
-
IS Audit Basics: Successful Audits Do Not Just HappenGelbstein, Ed et al. | 2015
- 10
-
Information Ethics: Is Information Technology Responsible for Corporate Crises?Raval, Vasant et al. | 2016
- 10
-
Testing Controls Associated With Data TransfersSingleton, T.W. et al. | 2012
- 11
-
Enterprise Security for the Executive: Setting the Tone From the TopAxelrod, C.W. et al. | 2011
- 11
-
Information Ethics: The Piracy of PrivacyRaval, V. et al. | 2014
- 12
-
Mobile Application SecurityCano M., J.J. et al. | 2011
- 12
-
The Practical Aspect: Third-party Risk ManagementRaval, Vasant / Shah, Samir et al. | 2017
- 12
-
Information Ethics: Information Technology and Innovation EthicsRaval, Vasant et al. | 2015
- 13
-
Changing the Mind-set-Creating a Risk-conscious and Security-aware CulturePironti, J.P. et al. | 2012
- 13
-
Book Review: Data Privacy for the Smart GridKivisild, A. Krista et al. | 2016
- 13
-
A Cost-effective Approach for Sarbanes-Oxley-regulated Application Systems With Minimal IT Control AssuranceJegousse, L. et al. | 2011
- 14
-
Risk Management in Agile Projects ([non-Roman script word])Moran, Alan et al. | 2016
- 14
-
Innovation Governance: What Is Innovation?Kelley, K. Brian et al. | 2019
- 14
-
IS Audit Basics: Risk to Entities Regarding Data BreachesSingleton, T. et al. | 2014
- 15
-
Technology's Role in Enterprise Risk ManagementBayuk, Jennifer et al. | 2018
- 16
-
Book Review: The Soft Edge: Where Great Companies Find Lasting SuccessIppoliti, Dino et al. | 2015
- 17
-
IT Scenario Analysis in Enterprise Risk ManagementFischer, U. et al. | 2011
- 17
-
Book Review: Governance of Enterprise IT Based on COBIT® 5: A Management GuidePrandini, Maria Patricia et al. | 2015
- 17
-
Book Review: IT Strategic and Operational ControlsPrandini, M.P. et al. | 2014
- 18
-
Auditing Agile—A Brave New World ([non-Roman script word])Ee, Chong et al. | 2016
- 18
-
Internet of Things Offers Great Opportunities and Much RiskGonzalez, Marcelo Hector / Djurica, Jana et al. | 2015
- 18
-
How Analytics Will Transform Internal AuditKress, Robert E. / Hildebrand, Dave M. et al. | 2017
- 18
-
Moving Toward Better Security for Today and TomorrowSaurbaugh, Mike et al. | 2019
- 18
-
COBIT 5 Processes From a Systems Management PerspectiveSuer, M. / Cullens, C. / Brancato, D. et al. | 2014
- 20
-
Security Through Effective Penetration TestingTrull, J. et al. | 2012
- 21
-
Is the TJ Hooper Case Relevant for Today's Information Security Environment?Tester, D. et al. | 2013
- 21
-
Key Considerations When Evaluating ISRM Programs and CapabilitiesPironti, J.P. et al. | 2011
- 22
-
The Role of the CISO and the Digital Security LandscapePutrus, Robert et al. | 2019
- 22
-
Applying a Technological Integration Decision Framework to Innovation GovernanceDavis, Robert E. et al. | 2018
- 24
-
Using Standards to Create Effect in the BoardroomKoning, E. / Bikker, H. et al. | 2013
- 24
-
Essential Frameworks and Methodologies to Maximize the Value of ITRenard, Laurent et al. | 2016
- 24
-
Creating Assurance in BlockchainSmith, A. Michael et al. | 2017
- 24
-
Strategic Alignment and E-health GovernanceBeratarbide, Elena / Kelsey, Thomas W. / Gil, Hermenegildo et al. | 2015
- 25
-
Auditing Oracle Databases Using CAATsCooke, I. et al. | 2014
- 25
-
Strengthening Information Security GovernanceGelbstein, E. et al. | 2012
- 27
-
The Struggle for Privacy and the Survival of the Secured in the IT EcosystemSathiyamurthy, S. et al. | 2011
- 27
-
Agile AuditAlexiou, Spiros et al. | 2017
- 28
-
Governance, Risk and Compliance-Tying It All TogetherPierre-Louis, S. / Sanchez, R. / Shek, M. et al. | 2013
- 28
-
Information Security Architecture Gap Assessment and PrioritizationGhaznavi-Zadeh, Rassoul et al. | 2018
- 28
-
Cloud InsecuritiesWlosinski, Larry G. et al. | 2015
- 29
-
Auditing Cyberinsurance PolicyOlakunle, J. et al. | 2014
- 30
-
Sponsored Feature: Why Security Product Investments Are Not WorkingKeef, Sean et al. | 2019
- 31
-
Optimizing Software Development With Lean Value Chain AnalysisMani, Vimal et al. | 2016
- 31
-
Sharing or Controlling? Examining the Decision to Segregate Information Within the OrganizationFoerster, C.A. et al. | 2012
- 32
-
Stop Looking for the Purple Squirrel: What's Wrong With Today's Cybersecurity Hiring PracticesLee, Marcelle et al. | 2019
- 33
-
Selected COBIT 5 Processes for Essential Enterprise SecurityGreene, Fredric et al. | 2015
- 33
-
Critical Information Systems ProcessesYildirim, T. / Metin, B. et al. | 2014
- 34
-
Quick Fixes for Improving CyberdefensesAgarwala, Sanjiv et al. | 2016
- 34
-
Common Myths of Service Organization Controls (SOC) ReportsSeshadri, D. et al. | 2013
- 34
-
Sponsored Feature: Centralized, Model-Driven Visibility Key to IT-OT Security ManagementDavidson, Ron et al. | 2018
- 35
-
Value Assessment Tool for ICT Projects at the European CommissionDzhumalieva, S. / Noell, F. / Baudu, S. et al. | 2011
- 36
-
The Missing Link in Assessing Cyberrisk Factors Through Supply ChainsEitan, Ofir et al. | 2018
- 36
-
Mitigating the Risk of OSS-based DevelopmentGold, C. et al. | 2012
- 36
-
Dealing With Difficult DataHoesing, Michael T. et al. | 2017
- 36
-
Evaluating Information Security SolutionsAnderson, Kerry A. et al. | 2015
- 37
-
ISO/IEC 27001:2005 Implementation and Certification-Doing It Again and AgainOdeshina, N. et al. | 2013
- 37
-
The Effect of the COSO 2013 Update on IS ProfessionalsWhite, J.H. et al. | 2014
- 37
-
Application Security RiskShubhamangala, B. R. / Saha, Snehanshu et al. | 2016
- 37
-
The Two Key Challenges of GDPR AdoptionSerres, Ramón et al. | 2019
- 39
-
Corporate Responsibility, Retaining Top Management CommitmentDubey, N. et al. | 2013
- 40
-
A Case for a Partnership Between Information Security and Records Information ManagementAnderson, K.A. et al. | 2012
- 41
-
Another Win for Global Consumer Data RightsBrunswick, Dave et al. | 2019
- 41
-
A Practical Approach to Continuous Controls MonitoringVohradsky, David et al. | 2015
- 42
-
Internal Audit's Contribution to the Effectiveness of Information Security (Part 1)Steinbart, P.J. / Raschke, R. / Gal, G. / Dilla, W.N. et al. | 2014
- 42
-
Why Cyber Insurance Needs Probabilistic and Statistical Cyberrisk Assessments More Than EverAtluri, Indrajit et al. | 2018
- 43
-
Securing Merchant Environments Is Good, Securing the Credit Card Itself Is BetterAlaswad, A. et al. | 2013
- 45
-
How to Increase Cybersecurity AwarenessNachin, Nipon / Tangmanee, Chatpong / Piromsopa, Krerk et al. | 2019
- 45
-
Fundamental Concepts of IT Security AssuranceHarnidovic, H. et al. | 2012
- 45
-
Standardized Scoring for Security and Risk MetricsPareek, Mukul et al. | 2017
- 45
-
An Introduction to ICT Continuity Based on BS 25777Hamidovic, H. et al. | 2011
- 46
-
A Nontraditional Approach to Prioritizing and Justifying Cybersecurity InvestmentsPutrus, Robert et al. | 2016
- 47
-
Why Should Organizations Care About Professional Certifications?Smart, B. et al. | 2013
- 48
-
Why Computer Ethics Matters to Computer AuditingLee, W.W. et al. | 2014
- 48
-
Checking the Maturity of Security Policies for Information and CommunicationLyra, Mauricio Rocha et al. | 2015
- 51
-
How Root Cause Analysis Fits Into Various Audit TypesDurmisevic-Mutapcic, Amra et al. | 2019
- 52
-
Tools: Five Linux Distributions With Tools for AuditMoyle, Ed et al. | 2018
- 53
-
Aligning Information Security With Enterprise Risk Management Using ISO/IEC 27001:2013Mani, V. et al. | 2014
- 54
-
HelpSource Q&ABakshi, Sunil et al. | 2018
- 54
-
Tools: Tools You May Already Have That Add Assurance ValueMoyle, Ed et al. | 2017
- 59
-
Standards, Guidelines, Tools and Techniques| 2015
- S1
-
ISACA Bookstore Supplement| 2015