IT Downloads Results for Topic : GovernanceShowing 1-10 of 10 Results
This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program.
Chapter 1 delves into the first four stages of systematic strategic planning, including clarifying current conditions, identifying competitive advantages, defining opportunities and developing strategies.
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle.
This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.
This document provides the empirical rationale for critical patient safety-related usability guidelines for standardization of EHRs.
The excerpt from chapter 5 focuses on the ins and outs of preparing for and running a risk management planning meeting, including necessary resources and expected outcomes.
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.
The chapter excerpt focuses on how effective data architecture must lay out the life cycle of data, from definition to capture, storage, management, integration, distribution, and analysis.
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices.
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations.