Search

Your search keyword '"CISO"' showing total 78 results

Search Constraints

Start Over You searched for: "CISO" Remove constraint "CISO" Topic data security Remove constraint Topic: data security Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
78 results on '"CISO"'

Search Results

1. 5 Top Cybersecurity-Zertifizierungen: So pushen Sie Ihre CISO-Karriere

2. The CISO Pilgrimage.

3. Anatomy of a CISO.

4. A View from the CISO: Insights from the Data Classification Process.

5. Smarter Cyber Risk Governance for Health Care in a Digital Transformation Age.

6. Service-Oriented Security Architecture and its Implications for Security Department Organization Structures.

7. Cybersecurity should return to reality and ditch the hype

8. Converging Data Privacy and Security.

9. Chapter News.

10. Exploring the social implications of buying and selling cyber security.

11. Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance.

12. Making and Breaking Data Security With Quantum Machines.

13. Developing Evaluation Criteria for end Users to Establish the Compliance Fitness of IT Governance in Indian Banking Industry.

14. Challenges in Certification and Accreditation.

15. Producing 'good enough' automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns.

16. Protecting a new Achilles heel: the role of auditors within the practice of data protection.

17. The Cloud Tanked My Deal.

18. Combating health care cyber crime.

19. Using machine learning to assist with the selection of security controls during security assessment.

21. Improving Incident Response in Big Data Ecosystems by Using Blockchain Technologies.

22. Mobile Devices and the Fifth Amendment.

23. The Strategic Problem of Information Security and Data Breaches.

24. Choosing Tokenization or Encryption.

25. Lessons about Cloud Security from 1980s Horror Movies.

26. Is Encryption Dead? Quantum Computing's Impact on Cryptography.

27. A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn't Work, and Cannot Be Made to Work.

28. Blended Families: Initial Steps to Security and Privacy Collaboration.

29. Fragmentation in Mobile Devices.

30. Enterprise Security Architecture: Key for Aligning Security Goals with Business Goals.

31. Privacy Piracy: The Shortcomings of the United States' Data Privacy Regime and How to Fix.

32. Payment Card Security: Is a Standard Enough?

33. An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures.

34. Machine Learning: A Primer for Security.

35. THE INTERNET OF THINGS: EMERGING LEGAL ISSUES FOR BUSINESSES.

36. A Qualitative Security Model for Business Processes.

37. The 2014 Healthcare IT Audit and Information Security Study.

38. Information Security Professionals' Perceptions about the Relationship between the Information Security and Internal Audit Functions.

39. Information security and business continuity management in interorganizational IT relationships.

40. Can spending on information security be justified?Evaluating the security spending decision from the perspective of a rational actor.

41. Information Security Governance for the Non-Security Business Executive.

42. Developing a Metrics Framework for the Federal Government in Computer Security Incident Response.

43. Information security governance in Saudi organizations: an empirical study.

44. Information security issues in higher education and institutional research.

45. eDiscovery versus Computer Forensics.

46. Information technology security management concerns in global financial services institutions.

47. FEDERAL SECURITY BREACH NOTIFICATIONS: POLITICS AND APPROACHES.

48. E-Discovery: Identifying and Mitigating Security Risks during Litigation.

49. A Coherent Strategy for Data Security through Data Governance.

50. The Key to Security Improvement Is Not What You Think.

Catalog

Books, media, physical & digital resources