IT Downloads Results for Topic : Governance

All
All
 
 
Showing 1-10 of 57 Results    
 
 
Compliance2

Building a GRC Program: Assessing Stakeholder Needs and Readiness

  ITDownload  
  |   CHECKLISTS   |   Oct 25, 2016
 

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.

...  More >>

 
Strategy2.jpg

Case Studies in Strategic Planning

  ITDownload  
  |   BOOK EXCERPTS   |   Sep 01, 2016
 

Chapter 1 delves into the first four stages of systematic strategic planning, including clarifying current conditions, identifying competitive advantages, defining opportunities and developing strategies.

...  More >>

 
Security73

Guide to Application Whitelisting

  ITDownload  
  |   TUTORIALS   |   Nov 09, 2015
 

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle.

...  More >>

 
Security29

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

  ITDownload  
  |   TUTORIALS   |   Nov 04, 2015
 

This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.

...  More >>

 
HealthCare01

Technical Evaluation, Testing, and Validation of the Usability of Electronic Health Records

  ITDownload  
  |   TUTORIALS   |   Oct 12, 2015
 

This document provides the empirical rationale for critical patient safety-related usability guidelines for standardization of EHRs.

...  More >>

 

Risk Management: Concepts and Guidance

  ITDownload  
  |   BOOK EXCERPTS   |   Apr 08, 2015
 

The excerpt from chapter 5 focuses on the ins and outs of preparing for and running a risk management planning meeting, including necessary resources and expected outcomes.

...  More >>

 
Global13

Considerations for Identity Management in Public Safety Networks

  ITDownload  
  |   POLICIES   |   Apr 02, 2015
 

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.

...  More >>

 
HealthCare01

Big Data and Health Analytics

  ITDownload  
  |   BOOK EXCERPTS   |   Mar 12, 2015
 

The chapter excerpt focuses on how effective data architecture must lay out the life cycle of data, from definition to capture, storage, management, integration, distribution, and analysis.

...  More >>

 
Security7

Risk Management for Replication Devices

  ITDownload  
  |   POLICIES   |   Feb 24, 2015
 

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices.

...  More >>

 
Security44

Assessing Security and Privacy Controls in Federal Information Systems and Organizations

  ITDownload  
  |   TUTORIALS   |   Dec 15, 2014
 

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations.

...  More >>

 
 
 
Pages:   1 2Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.