IT Downloads Results for Type : Checklists

All
All
 
 
Showing 1-10 of 60 Results    
 
 
Compliance2

Building a GRC Program: Assessing Stakeholder Needs and Readiness

  ITDownload  
  |   CHECKLISTS   |   Oct 25, 2016
 

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.

...  More >>

 
DataCtr5

Colocation Checklist

  ITDownload  
  |   CHECKLISTS   |   Oct 06, 2016
 

This checklist will help make sure you ask the important questions that will affect your colocation services and your eventual purchase decisions.

...  More >>

 
Checkbox1

National Checklist Program for IT Products – Guidelines for Checklist Users and Developers

  ITDownload  
  |   CHECKLISTS   |   Jan 14, 2016
 

This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products.

...  More >>

 
Global1

Virtual Meeting Checklist

  ITDownload  
  |   CHECKLISTS   |   Mar 18, 2014
 

Like any meeting, a virtual meeting should be well planned and engaging for all those who attend. Unfortunately, most who take part in frequent virtual meetings don’t often find that is the case.

...  More >>

 
Career03

Dos and Don'ts for Online Screening of Job Applicants

  ITDownload  
  |   CHECKLISTS   |   Feb 12, 2014
 

This list will help you better understand what information you should look for and the types of data you can’t use in your decision-making process.

...  More >>

 

Effective Meeting Checklist

  ITDownload  
  |   CHECKLISTS   |   Jan 31, 2014
 

Learn how to plan and execute an efficient, effective and productive meeting using this meeting checklist.

...  More >>

 
Guidelines

Managing the Security of Mobile Devices in the Enterprise

  ITDownload  
  |   CHECKLISTS   |   Jul 09, 2013
 

This publication provides recommendations for selecting, implementing, and using centralized management technologies, and it explains the security concerns inherent in mobile device use and provides recommendations for securing mobile devices throughout their life cycles.

...  More >>

 
Checklist

Guide to Website Security

  ITDownload  
  |   CHECKLISTS   |   Jul 02, 2013
 

Basic guidelines and security safeguards that can be applied to public websites to reduce the attack surface or mitigate the effects of a compromise.

...  More >>

 
System Integrity Best Practices

System Integrity Best Practices

  ITDownload  
  |   CHECKLISTS   |   Mar 15, 2012
 

Software authenticity and the assurance of user identity are two key components of system integrity.

...  More >>

 
Database Encryption Readiness Assessment

Database Encryption Readiness Assessment

  ITDownload  
  |   CHECKLISTS   |   Feb 28, 2012
 

Determine if data encryption is a fit for the company's critical information....  More >>

 
 
 
Pages:   1 2Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.