The Optimal Risk Management Framework (English)
- New search for: Marks, Larry
- New search for: Marks, Larry
In:
ISACA journal
;
1
;
40-45
;
2019
-
ISSN:
- Article (Journal) / Print
-
Title:The Optimal Risk Management Framework
-
Contributors:Marks, Larry ( author )
-
Published in:ISACA journal ; 1 ; 40-45
-
Publisher:
- New search for: Information Systems Audit and Control Association
-
Publication date:2019-01-01
-
Size:6 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.450285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.450285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: Extra, Extra, Read All About ItRoss, S.J. et al. | 2014
- 3
-
Information Security Matters: Managing Availability in the Multi-Modal EraRoss, Steven J. et al. | 2018
- 4
-
Information Security Matters: A Room With MachinesRoss, S.J. et al. | 2012
- 4
-
Information Security Matters: Fifty Years of Information SecurityRoss, Steven J. et al. | 2019
- 4
-
Guest Editorial: Forget the Governance! What to Do When the CEO Says `Get It Done!'Guldentops, E. et al. | 2013
- 4
-
Information Security Matters: A Fundamental QuestionRoss, S.J. et al. | 2011
- 4
-
Information Security Matters: Microwave SoftwareRoss, S.J. et al. | 2015
- 4
-
Information Security Matters: State-on-state CyberconflictsRoss, Steven J. et al. | 2017
- 5
-
Cloud Computing: Process Automation From the CloudRauscher, J. et al. | 2014
- 5
-
Information Security Matters: Mean TimesRoss, S.J. et al. | 2013
- 6
-
IS Audit Basics: Backup and RecoveryCooke, Ian et al. | 2018
- 6
-
Cloud Computing: Securing Cloud-based ApplicationsMendelsohn, M. / Philipovitch, A. / Welch, W. / Zanella, R. et al. | 2012
- 6
-
Guest Editorial: Monitoring From the Cloud-Insights on DemandCangemi, M.P. et al. | 2015
- 7
-
Cloud Computing: Shifting the Focus to Long-term, Value-add Projects With a Cloud EnvironmentPirooz, S. et al. | 2013
- 7
-
IS Audit Basics: Understanding the Cybercrime WaveSingleton, T. et al. | 2014
- 7
-
IT Audit Basics: How the IT Auditor Can Make Substantive Contributions to a Financial AuditSingleton, T.W. et al. | 2011
- 7
-
IS Audit Basics: Assurance Considerations for Ongoing GDPR ConformanceCooke, Ian et al. | 2019
- 8
-
The NetworkHeikkinen, T. et al. | 2015
- 8
-
IS Audit Basics: Preparing for Auditing New Risk, Part 1Gelbstein, Ed et al. | 2017
- 9
-
IT Audit Basics: Evaluating Access Controls Over DataSingleton, T.W. et al. | 2012
- 10
-
Five Questions WithFeinman, T. et al. | 2011
- 10
-
IS Audit Basics: Perspectives From a Seasoned PractitionerGelbstein, E. et al. | 2015
- 10
-
IT Audit Basics: How to Properly Audit a Client Who Uses a Service Organization-SOC Report or No SOC ReportSingleton, T.W. et al. | 2013
- 12
-
Book Review: IT Governance for CEOs and Members of the BoardEtea, I.K. et al. | 2014
- 12
-
Cloud Computing: Are Your Data Secure in the Cloud?Nye, J. et al. | 2015
- 13
-
Book Review: Big Data: A Revolution That Will Transform How We Live, Work, and ThinkParekh, U. et al. | 2014
- 13
-
Cloudifying Threats—Understanding Cloud App Attacks and DefensesSood, Aditya K. / Jalil, Rehan et al. | 2018
- 14
-
SCADA Cybersecurity FrameworkMalaviya, S. et al. | 2014
- 14
-
Data Privacy, Data Protection and the Importance of Integration for GDPR ComplianceBrunswick, Dave et al. | 2019
- 14
-
Database Backup and Recovery Best PracticesAkhtar, A.N. / Buchholtz, J. / Ryan, M. / Setty, K. et al. | 2012
- 14
-
The Automation ConundrumZongo, Phillimon et al. | 2017
- 16
-
Book Review: Cybersecurity and Cyberwar: What Everyone Needs to KnowMarks, L. et al. | 2015
- 16
-
Book Review: IT Governance: A Pocket GuideSule, D. et al. | 2013
- 16
-
Auditing Security Risks in Virtual IT SystemsChaudhuri, A. / von Solms, S.H. / Chaudhuri, D. et al. | 2011
- 17
-
Book Review: Secure: Insights From the People Who Keep Information SafeKivisild, A.K. et al. | 2015
- 17
-
Governance Implementation-COBIT 5 and ISOMarks, L. et al. | 2013
- 18
-
NIST's New Password Rule BookFulmer, Bachman / Walters, Melissa / Arnold, Bill et al. | 2019
- 18
-
Effective Cyberthreat Management Evolution and BeyondSehgal, S. et al. | 2015
- 19
-
Key Considerations in Protecting Sensitive Data Leakage Using Date Loss Prevention ToolsKumaresan, N. et al. | 2014
- 20
-
Key Issues, Challenges and Resolutions in Implementing Business Continuity ProjectsTammineedi, R.L.S. et al. | 2012
- 22
-
Phishing Detection and Loss Computation Hybrid ModelBiswas, Baidyanath / Mukhopadhyay, Arunabha et al. | 2017
- 22
-
Implementing an Information Security Continuous Monitoring Solution-A Case StudyLuu, T. et al. | 2015
- 23
-
Mistakes Happen! Mitigating Unintentional Data LossVan Stone, Mike / Halpert, Ben et al. | 2018
- 24
-
The Road to GDPR ComplianceBarclay, Corlane et al. | 2019
- 24
-
Effective IT Governance Through the Three Lines of Defense, Risk IT and COBITOyemade, R. et al. | 2012
- 24
-
IT Policy Framework Based on COBIT 5Carrillo, J. et al. | 2013
- 24
-
Challenges and Benefits of Migrating to COBIT 5 in the Strongly Regulated Environment of EU Agricultural Paying AgenciesArcidlacono, G. et al. | 2014
- 26
-
A Young Professional's Guide to Career Success Using Soft SkillsKandra, M. / Sewell, T. / Nyamari, J. et al. | 2011
- 27
-
Auditing for PII Security ComplianceMohammed, D. et al. | 2014
- 28
-
Influence of International Best Practices on the South African Public Service's Corporate Governance of ICTvan der Walt, T. / Coetsee, A.D. / von Solms, S.H. et al. | 2013
- 29
-
User Threats Vs. User PrivacyVlachos, D. et al. | 2015
- 30
-
Applying AI in Application SecurityMaraju, Kiran et al. | 2018
- 30
-
Sponsored Feature: Why Attackers Are Turning Their Attention Toward ERP ApplicationsPerez-Etchegoyen, Juan Pablo et al. | 2019
- 30
-
Information Risk Management for Supporting a Basel II InitiativeDutta, A. / Sista, P. et al. | 2012
- 31
-
Understanding Software Metric UseHenderson, D. / Sheetz, S.D. / Wallace, L. et al. | 2015
- 31
-
Risk Management in 4G LTEBhasker, D. et al. | 2014
- 31
-
Chain Exploitation-Social Networks MalwareSood, A.K. / Enbody, R. et al. | 2011
- 31
-
Sponsored Feature: Indicators of Exposure and Attack Surface VisualizationCircus, Ravid et al. | 2017
- 32
-
Reporting on GDPR Compliance to the BoardPearce, Guy et al. | 2019
- 33
-
Creating the Business Case for ERP System Acquisitions Using GEITZoughbi, G. et al. | 2013
- 36
-
Meeting Security and Compliance Requirements Efficiently With TokenizationBeiseel, S. et al. | 2014
- 37
-
A Machine Learning Approach for Telemedicine GovernancePal, Shounak / Mukhopadhyay, Arunabha et al. | 2017
- 37
-
Big Data Deidentification, Reidentification and AnonymizationKhan, Mohammed J. et al. | 2018
- 38
-
Auditing SQL Server Databases Using CAATsCooke, I. et al. | 2015
- 38
-
Simplify and Layer Your Security Approach to Protect Card DataHorton, T. et al. | 2011
- 38
-
The Devil's in the DetailsDavis, S. / Ferrell, P. / Scranton, S. / Millar, P. et al. | 2012
- 39
-
BYOD Security Considerations of Full Mobility and Third-party Cloud ComputingYu, W.E. et al. | 2013
- 40
-
The Optimal Risk Management FrameworkMarks, Larry et al. | 2019
- 42
-
Incorporating COBIT Best Practices in PCI DSS V2.0 for Effective ComplianceNicho, M. et al. | 2012
- 42
-
Privacy Audit-Methodology and Related ConsiderationsRiffat, M. et al. | 2014
- 42
-
The Machine Learning Audit—CRISP-DM FrameworkClark, Andrew et al. | 2018
- 43
-
Information Security From a Business Perspective: A Lottery Sector Case StudyDimitriadis, C.K. et al. | 2011
- 43
-
IT Governance Implementation-Formulating and Presenting Practical Business CasesBhatia, R. et al. | 2013
- 43
-
Audit Accounting Data Using Excel Pivot TablesFilzen, J.J. / Simkin, M.G. et al. | 2015
- 46
-
Smashing the Information Security Policy for Fun and ProfitDavid Eduardo Acosta, R. et al. | 2017
- 46
-
Unlocking Hidden Value in ERP System Acquisitions Using Risk ManagementZoughbi, G. et al. | 2014
- 46
-
The Four Questions for Successful DLP ImplementationNanchengwa, Christopher et al. | 2019
- 46
-
Building and Maintaining Effective Mechanisms for Implementing IT GovernanceRobinson, I. / Jodha, M. et al. | 2013
- 48
-
Implementation of Big Data in Commercial BanksAkanni, Adeniyi et al. | 2018
- 49
-
Information Security Continuous MonitoringHargenrader, B. et al. | 2015
- 49
-
The Modernization Problem, Part 1Henry, K. et al. | 2013
- 52
-
Crossword PuzzleMellor, M. et al. | 2013
- 52
-
Using Open Source Tools to Support Technology GovernanceMoyle, Ed et al. | 2017
- 52
-
Tools: Data Protection ToolsMoyle, Ed et al. | 2018
- 53
-
CPE Quiz #146 Based on Volume 5, 2012Chan, S. et al. | 2013