dcsimg

Find an IT Download
 

IT Downloads Results for Topic : Governance

Showing 1-10 of 10 Results    
Compliance2

Building a GRC Program: Assessing Stakeholder Needs and Readiness

  ITDownload  
  |   CHECKLISTS  |   Oct 25, 2016

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.

Strategy2.jpg

Case Studies in Strategic Planning

  ITDownload  
  |   BOOK EXCERPTS  |   Sep 01, 2016

Chapter 1 delves into the first four stages of systematic strategic planning, including clarifying current conditions, identifying competitive advantages, defining opportunities and developing strategies.

Security73

Guide to Application Whitelisting

  ITDownload  
  |   TUTORIALS  |   Nov 09, 2015

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle.

Security29

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

  ITDownload  
  |   TUTORIALS  |   Nov 04, 2015

This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.

HealthCare01

Technical Evaluation, Testing, and Validation of the Usability of Electronic Health Records

  ITDownload  
  |   TUTORIALS  |   Oct 12, 2015

This document provides the empirical rationale for critical patient safety-related usability guidelines for standardization of EHRs.

Risk Management: Concepts and Guidance

  ITDownload  
  |   BOOK EXCERPTS  |   Apr 08, 2015

The excerpt from chapter 5 focuses on the ins and outs of preparing for and running a risk management planning meeting, including necessary resources and expected outcomes.

Global13

Considerations for Identity Management in Public Safety Networks

  ITDownload  
  |   POLICIES  |   Apr 02, 2015

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.

HealthCare01

Big Data and Health Analytics

  ITDownload  
  |   BOOK EXCERPTS  |   Mar 12, 2015

The chapter excerpt focuses on how effective data architecture must lay out the life cycle of data, from definition to capture, storage, management, integration, distribution, and analysis.

Security7

Risk Management for Replication Devices

  ITDownload  
  |   POLICIES  |   Feb 24, 2015

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices.

Security44

Assessing Security and Privacy Controls in Federal Information Systems and Organizations

  ITDownload  
  |   TUTORIALS  |   Dec 15, 2014

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations.