dcsimg

Find an IT Download
 

IT Downloads Results for Topic : Governance

Showing 1-7 of 7 Results    
Compliance2

Building a GRC Program: Assessing Stakeholder Needs and Readiness

  ITDownload  
  |   CHECKLISTS  |   Oct 25, 2016

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.

Strategy2.jpg

Case Studies in Strategic Planning

  ITDownload  
  |   BOOK EXCERPTS  |   Sep 01, 2016

Chapter 1 delves into the first four stages of systematic strategic planning, including clarifying current conditions, identifying competitive advantages, defining opportunities and developing strategies.

Security73

Guide to Application Whitelisting

  ITDownload  
  |   TUTORIALS  |   Nov 09, 2015

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle.

Security29

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

  ITDownload  
  |   TUTORIALS  |   Nov 04, 2015

This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.

HealthCare01

Technical Evaluation, Testing, and Validation of the Usability of Electronic Health Records

  ITDownload  
  |   TUTORIALS  |   Oct 12, 2015

This document provides the empirical rationale for critical patient safety-related usability guidelines for standardization of EHRs.

Risk Management: Concepts and Guidance

  ITDownload  
  |   BOOK EXCERPTS  |   Apr 08, 2015

The excerpt from chapter 5 focuses on the ins and outs of preparing for and running a risk management planning meeting, including necessary resources and expected outcomes.

Global13

Considerations for Identity Management in Public Safety Networks

  ITDownload  
  |   POLICIES  |   Apr 02, 2015

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.