Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Federal Information Security Management Act of 2002 (view), Open Information Security Management Maturity Model (view)

searching for Information security management 122 found (211 total)

alternate case: information security management

ISO/IEC 27006 (577 words) [view diff] case mismatch in snippet view article find links to article

Commission (IEC). Part of the ISO/IEC 27000 series of ISO/IEC Information Security Management System (ISMS) standards, it is titled Information technology
ISO/IEC 27005 (896 words) [view diff] case mismatch in snippet view article find links to article
security risks - processes at the very heart of an ISO27k Information Security Management System (ISMS). It aims to ensure that organizations design
ISO/IEC JTC 1/SC 27 (2,025 words) [view diff] exact match in snippet view article find links to article
Management of information and ICT security; in particular information security management systems, security processes, security controls and services;
ISO/IEC 27040 (1,353 words) [view diff] exact match in snippet view article find links to article
SC27's program of work includes International Standards for information security management systems (ISMS), often referred to as the 'ISO/IEC 27000-series'
Maturity model (505 words) [view diff] no match in snippet view article find links to article
A maturity model is a framework for measuring an organization's maturity, or that of a business function within an organization, with maturity being defined
Universiti Malaysia Sarawak (779 words) [view diff] case mismatch in snippet view article find links to article
Information Services (CAIS). UNIMAS has implemented and maintains an Information Security Management System (ISMS) that fulfils the requirements of ISO/IEC 27001:2005
Upbit (465 words) [view diff] case mismatch in snippet view article find links to article
certifications from the Korea Internet and Security Agency for Information Security Management System (ISMS)[citation needed] and the International Organization
ISO/IEC 27007 (462 words) [view diff] exact match in snippet view article find links to article
Guidelines for information security management systems auditing is a standard providing guidance on: managing an information security management system (ISMS)
Business continuity planning (4,964 words) [view diff] exact match in snippet view article find links to article
5 January 2023. "BS 7799-1:1995 Information security management - Code of practice for information security management systems". BSI Group. Retrieved 5
IRC flood (1,298 words) [view diff] case mismatch in snippet view article find links to article
ISBN 0-07-226299-0. Tipton, Harold F.; Krause, Micki, eds. (2004-12-28). Information Security Management Handbook. Vol. 2 (5th ed.). Auerbach Publications. p. 517.
ISO/IEC 27004 (649 words) [view diff] exact match in snippet view article find links to article
Information Security Management – Monitoring, measurement, analysis and evaluation is an international standard supporting an information security management
ECOGRA (601 words) [view diff] case mismatch in snippet view article find links to article
the certification of online gaming software and the audit of Information Security Management Systems. The organisation has been awarded the United Kingdom
Hardening (computing) (421 words) [view diff] case mismatch in snippet view article
system Security-Enhanced Linux Workman, Michael (2021-10-29). Information Security Management. Jones & Bartlett Learning. p. 240. ISBN 978-1-284-21165-8
ISO/IEC 27003 (313 words) [view diff] exact match in snippet view article find links to article
techniques — Information security management systems — Guidance. It is part of a family of standards of information security management system (ISMS)
Traffic Light Protocol (719 words) [view diff] exact match in snippet view article find links to article
specifications for TLP exist. From ISO/IEC, as part of the Standard on Information security management for inter-sector and inter-organizational communications. From
Sherwood Applied Business Security Architecture (470 words) [view diff] exact match in snippet view article find links to article
and it is central to the success of a strategic program of information security management within the organization. SABSA is a particular example of a
IT disaster recovery (2,424 words) [view diff] case mismatch in snippet view article find links to article
essential as part of Business Continuity Management (BCM) and Information Security Management (ICM) as specified in ISO/IEC 27001 and ISO 22301 respectively
2019 cyberattacks on Sri Lanka (617 words) [view diff] case mismatch in snippet view article find links to article
Matthew (2017). "A Sri Lankan hacking case study". Australian Information Security Management Conference. doi:10.4225/75/5a84fb0495b50. Retrieved 2023-10-07
For Official Use Only (509 words) [view diff] case mismatch in snippet view article find links to article
Limiting Marker (DLM) defined by the Australian Government Information Security Management Guidelines. The guidelines state that FOUO should only be used
Standard of Good Practice for Information Security (593 words) [view diff] case mismatch in snippet view article find links to article
computing. The Standard is aligned with the requirements for an Information Security Management System (ISMS) set out in ISO/IEC 27000-series standards, and
Interxion (1,871 words) [view diff] case mismatch in snippet view article find links to article
management. This has been integrated with Interxion's existing Information Security Management System (ISMS) certification ISO 27001:2005 standard for all
Ministry of Justice (Kazakhstan) (389 words) [view diff] case mismatch in snippet view article
organization of work to protect state secrets Information Management Information Security Management Subordinate organizations of the ministry: Center for legal
Malaysian Electronic Payment System (625 words) [view diff] case mismatch in snippet view article find links to article
MEPS is accredited with the following: ISO / IEC 27001 for Information Security Management System (ISMS) ISO 9001: 2008 Quality Management System MS 1900:
List of ISO standards 26000–27999 (2,059 words) [view diff] exact match in snippet view article find links to article
Information security management systems – Overview and vocabulary ISO/IEC 27001:2022 Information technology – Security techniques – Information security
Tata Play (1,268 words) [view diff] case mismatch in snippet view article find links to article
guidance for the establishment and proper maintenance of an Information Security Management System (ISMS). Direct-to-home television in India "Tata Sky
NIPRNet (393 words) [view diff] case mismatch in snippet view article find links to article
August 2021. Harold F. Tipton; Micki Krause Nozaki (2010). Information Security Management Handbook, Volume 4 (6th ed.). CRC Press. p. 67. ISBN 9781439819036
SIPRNet (537 words) [view diff] case mismatch in snippet view article find links to article
August 2021. Harold F. Tipton; Micki Krause Nozaki (2010). Information Security Management Handbook, Volume 4 (6th ed.). CRC Press. p. 67. ISBN 9781439819036
Simple Network Management Protocol (5,085 words) [view diff] case mismatch in snippet view article find links to article
Information Security Management Handbook, Sixth Edition. CRC Press. ISBN 9780849374951. Douglas Mauro; Kevin Schmidt (2005). Information Security Management
International Electrotechnical Commission (1,427 words) [view diff] exact match in snippet view article find links to article
ISO/IEC 27001 (Information technology, Security techniques, Information security management systems, Requirements) and ISO/IEC 17000 series, carry the
National Computer Network Emergency Response Technical Team/Coordination Center of China (2,479 words) [view diff] case mismatch in snippet view article find links to article
Computer Network and Information Security Management Center was established. In 2000, the Computer Network and Information Security Management Office of the
BSI Group (1,816 words) [view diff] case mismatch in snippet view article find links to article
22301 (Business Continuity Management Systems) ISO/IEC 27001 (Information Security Management Systems) ISO 31000 (Risk Management) ISO 45001 (Occupational
Robert Slade (1,238 words) [view diff] case mismatch in snippet view article find links to article
in 2004 and his chapter on the subject is in print in the Information Security Management Handbook as of the fifth edition. Today Slade is a consultant
Alibaba Cloud (2,002 words) [view diff] case mismatch in snippet view article find links to article
first Chinese cloud service provider to pass ISO27001:2005 (Information Security Management System). In January 2013, Alibaba Cloud merged with HiChina
Insider threat (1,299 words) [view diff] exact match in snippet view article find links to article
Lizzie; Theoharidou, Marianthi (2010), Insider threat and information security management. In Insider threats in cyber security (pp. 45-71), Springer
Software licensing audit (931 words) [view diff] case mismatch in snippet view article find links to article
27001:2005 Information Technology - Security Techniques - Information Security Management Systems - Requirements and ISO/IEC 17799:2005 Information Technology
ISO 31000 (2,344 words) [view diff] exact match in snippet view article find links to article
systems ISO 22000 for food safety management ISO 27000 for information security management systems ISO 28000 for security management systems ISO 45001
Muscat Securities Market (747 words) [view diff] case mismatch in snippet view article find links to article
of Securities", and the ISO 27001:2005 certification for "Information Security Management System". Economy of Oman List of Mideast stock exchanges List
Land Information and Communications Services Group (292 words) [view diff] exact match in snippet view article find links to article
Security Strategy and ISO/IEC 27001 (a compliance standard for information security management), offering specialist expertise and advice at every stage of
KY-3 (229 words) [view diff] case mismatch in snippet view article find links to article
until the late 1980s. STU-III Secure Terminal Equipment SCIP Information Security Management Handbook, Volume IV at Google Books "KY-3". cryptomuseum.com
Stanbic Bank Uganda Limited (1,752 words) [view diff] case mismatch in snippet view article find links to article
Institution. The certification is in recognition of the bank's Information Security Management Systems "compliance with global standards". In May 2024, Stanbic
QNAP Systems (867 words) [view diff] exact match in snippet view article find links to article
Choice Award 2016 2014 Received ISO 27001:2013 certification in information security management Received 2014 iF Product Design Award Featured in PCWorld's
Clarivate (2,968 words) [view diff] exact match in snippet view article find links to article
of the ISO/IEC 27001:2013 certification is limited to the information security management system (ISMS) supporting the systems, products and services
ISO/IEC 27701 (1,151 words) [view diff] case mismatch in snippet view article find links to article
ISO/IEC 27001. The design goal is to enhance the existing Information Security Management System (ISMS) with additional requirements in order to establish
ISO/IEC 20000 (1,377 words) [view diff] case mismatch in snippet view article find links to article
Quality Management System based on ISO 9001:2015 and/or an Information Security Management System based on ISO/IEC 27001:2013. ISO/IEC TR 20000-9:2015
Ministry of Interior (Libya) (268 words) [view diff] case mismatch in snippet view article
security in the entire country. Management of public affairs Information Security Management Operations Management Technical Affairs Department the Department
Nintendo data leak (4,336 words) [view diff] exact match in snippet view article find links to article
deal with information leaks by stating they had "introduced information security management", as well as acknowledging the company would continue to advance
ONE Bank (916 words) [view diff] exact match in snippet view article find links to article
received International Organisation for Standardisation for information security management. In 2023, the bank changed its name to ONE Bank PLC. "Board
HyperWRT (315 words) [view diff] case mismatch in snippet view article find links to article
Hardware and Custom Firmware. Proceedings of 3rd Australian Information Security Management Conference. Edith Cowan University. pp. 1–10. Retrieved February
Bastion host (510 words) [view diff] case mismatch in snippet view article find links to article
2003). The CISM Prep Guide: Mastering the Five Domains of Information Security Management. Wiley. p. 12. ISBN 978-0-471-45598-1. R. Shirey (August 2007)
International Organization for Standardization (4,401 words) [view diff] case mismatch in snippet view article find links to article
name. For example: ISO/IEC TR 17799:2000 Code of Practice for Information Security Management ISO/TR 19033:2000 Technical product documentation – Metadata
Japanese Industrial Standards (2,480 words) [view diff] exact match in snippet view article find links to article
continuity management systems-Guidance to ISO 22313 JIS Q 27001 - Information security management systems - requirements JIS Q 31000 - Risk management-Guidelines
Annex SL (1,434 words) [view diff] exact match in snippet view article find links to article
Information security, cybersecurity and privacy protection — Information security management systems — Requirements ISO 28000:2022, Security and resilience
Bell–LaPadula model (1,151 words) [view diff] case mismatch in snippet view article find links to article
(1994). "Relational Database Access Controls". Handbook of Information Security Management (1994-95 Yearbook). Auerbach Publishers. pp. 145–160. S2CID 18270922
European Organization for Quality (613 words) [view diff] case mismatch in snippet view article find links to article
FSM 3 Food & Safety Auditor FSA 3 Information Security Management System Manager ISMSM 3 Information Security Management System Auditor ISMSA 3 Laboratory
Promiscuous mode (654 words) [view diff] case mismatch in snippet view article find links to article
promiscuous mode Sumit Dhar, Sniffers: Basics and Detection (PDF), Version 1.0-1, Information Security Management Team, Reliance Infocomm, retrieved 2024-12-01
Information system (5,882 words) [view diff] exact match in snippet view article find links to article
The chief information security officer (CISO) focuses on information security management.[citation needed] The six components that must come together
University of Fairfax (820 words) [view diff] case mismatch in snippet view article find links to article
degree from Fairfax and a Master of Business Administration in Information Security Management from Jones International. Its first president was Dr. Victor
Piggybacking (security) (621 words) [view diff] case mismatch in snippet view article
 85–. ISBN 978-0-12-417237-1. Krause, Micki (6 April 2006). Information Security Management Handbook on CD-ROM, 2006 Edition. CRC Press. p. 3800. ISBN 978-0-8493-8585-8
Acronis True Image (1,095 words) [view diff] case mismatch in snippet view article find links to article
Automation of Security and Privacy Controls for Efficient Information Security Management. 2021 2nd International Conference on Secure Cyber Computing
Xpertdoc (1,800 words) [view diff] case mismatch in snippet view article find links to article
1. O'Donnell, Anthony R. "Xpertdoc Achieves ISO/IEC 27001 Information Security Management Certification". Insurance Innovation Reporter, September 21
Ministry of Industry and Information Technology (3,332 words) [view diff] exact match in snippet view article find links to article
responsible for communications network security and related information security management, be responsible for coordinating and maintaining national information
Jaring (822 words) [view diff] case mismatch in snippet view article find links to article
initiative to pursue the globally recognised certifications in Information Security Management System. On 20 July 2011, SIRIM QAS International formally awarded
National Defence University of Warsaw (1,462 words) [view diff] case mismatch in snippet view article find links to article
studies in the field of: National Security Aviation Management Information Security Management Economic Systems Logistics Crisis Management International
LegalEagle (866 words) [view diff] case mismatch in snippet view article find links to article
process. The National Security Council (NSC) Records Access and Information Security Management Directorate (RAISMD) were named as the primary defendants in
Hyundai Capital (1,520 words) [view diff] case mismatch in snippet view article find links to article
camp, Castle of Skywalkers. Hyundai Capital Services obtained Information Security Management System(ISMS) 'ISO27001' certificate in January 2008. In July
TRA, Inc. (463 words) [view diff] exact match in snippet view article find links to article
the U.S. to have obtained ISO/IEC 27001certification, the information security management system standard published by the International Organization
EMASS (428 words) [view diff] case mismatch in snippet view article find links to article
situational awareness, manage risk, and comply with the Federal Information Security Management Act (FISMA 2002) and the Federal Information Security Modernization
International Federation for Information Processing (4,173 words) [view diff] case mismatch in snippet view article find links to article
IFIP TC11 currently has the following working groups: WG 11.1 Information Security Management WG 11.2 Pervasive Systems Security WG 11.3 Data and Application
Sundaram Medical Foundation (342 words) [view diff] case mismatch in snippet view article find links to article
hospital in India to be certified with ISO/ IEC 27001:2005 – Information Security Management in Sep 2007 and upgraded to 2013 version in Sep 2015. India
Outsourcing (12,162 words) [view diff] case mismatch in snippet view article find links to article
"midsourcing" model Harold F. Tipton; Micki Krause (2003). Information Security Management Handbook, Fifth Edition. Taylor & Francis. ISBN 978-0-8493-1997-6
Ancell School of Business (166 words) [view diff] case mismatch in snippet view article find links to article
Management Supervisory Management Management Information Systems Information Security Management Marketing E-commerce and Internet Marketing Ancell School of
Cryptocurrency (20,417 words) [view diff] case mismatch in snippet view article find links to article
this unit requires that all exchanges are certified by the Information Security Management System and that they ensure all customers have real name bank
AtGlobal (555 words) [view diff] exact match in snippet view article find links to article
the Information Security Management Systems Accreditation Center (ISMS-AC) as certified to JIS Q 27001:2023/ISO/IEC 27001 (information security management
The Spamhaus Project (4,024 words) [view diff] case mismatch in snippet view article find links to article
June 2014. Harold F. Tipton; Micki Krause (17 March 2008). Information Security Management Handbook, Sixth Edition. CRC Press. pp. 56–. ISBN 978-1-4200-6710-1
Premium Pension Limited (479 words) [view diff] exact match in snippet view article find links to article
International Organization for Standardization (ISO) certificate on information security management system by the British Standard Institute, becoming the first
Information Security Forum (977 words) [view diff] exact match in snippet view article find links to article
Management. It can be used to build a framework for developing an information security management system. In addition to covering information security-related
Xiaomi (9,546 words) [view diff] case mismatch in snippet view article find links to article
Data Protection Regulation (GDPR), namely its ISO/IEC 27001 Information Security Management Standards and the ISO/IEC 27701 Privacy Information Management
Organizational structure (5,951 words) [view diff] case mismatch in snippet view article find links to article
(2022). "Networked Organizational Structure of Enterprise Information Security Management Based on Digital Transformation and Genetic Algorithm". Frontiers
Corporate governance of information technology (2,016 words) [view diff] case mismatch in snippet view article find links to article
- Focus on IT Service management ISO/IEC 27001 - Focus on Information Security Management ISO/IEC 27005 - Focus on Information Security Risk Management
Shell shoveling (258 words) [view diff] case mismatch in snippet view article find links to article
2023-10-05. Tipton, Harold "Hal" F.; Krause, Micki (2007). Information Security Management Handbook (6 ed.). CRC Press. p. 2839. ISBN 978-1-4200-1358-0
Ministry of Foreign Affairs (Indonesia) (4,875 words) [view diff] exact match in snippet view article
diplomatic digital data, integrated communication system, information security management, and diplomatic cyphers, within the Ministry and the Missions
National Research University of Electronic Technology (503 words) [view diff] case mismatch in snippet view article find links to article
outside institutes Infocommunication technologies and systems Information security Management Applied mathematics Leonid Viktorovich Ershov – 1966 (acting)
Carrenza (584 words) [view diff] case mismatch in snippet view article find links to article
security and quality standards. These include: ISO27001:2005, Information Security Management System for all Carrenza services. UK Government G-Cloud, Carrenza
Computer security incident management (1,551 words) [view diff] exact match in snippet view article find links to article
Information technology - Security techniques - Code of practice for information security management. ISO copyright office. 2005-06-15. pp. 90–94. "NIMS - The Incident
Mantrap (access control) (410 words) [view diff] case mismatch in snippet view article
Systems FAQ, Q1 Tipton, Harold F. & Krause, Micki (2008). Information Security Management Handbook, Volume 2. CRC Press. pp. 202–203. ISBN 9781420067088
Mac Thornberry (2,560 words) [view diff] case mismatch in snippet view article find links to article
reforming a range of current laws, including the 2002 Federal Information Security Management Act, which governs government security programs. In a 2012
Domain Name System Security Extensions (7,897 words) [view diff] case mismatch in snippet view article find links to article
deploy DNSSEC. NIST intended to release new DNSSEC Federal Information Security Management Act (FISMA) requirements in NIST SP800-53-R1, referencing this
Cyber-Duck (949 words) [view diff] case mismatch in snippet view article find links to article
2016 with the ISO 27001 – the focus of this accreditation was Information Security Management.[citation needed] In 2022, Cyber-Duck gained the ISO 14001
Victor Berlin (821 words) [view diff] case mismatch in snippet view article find links to article
degree from Fairfax and a Master of Business Administration in Information Security Management from Jones International. Berlin served as president of the
Legal affairs of the first Trump presidency (7,534 words) [view diff] case mismatch in snippet view article find links to article
Eagle, LLC v. National Security Council Records Access and Information Security Management Directorate Lawsuit alleging "retaliatory imprisonment" in
NIST SP 800-92 (692 words) [view diff] case mismatch in snippet view article find links to article
information including storage and transmission. FISMA (Federal Information Security Management Act of 2002). Stipulates federal requirements for managing
List of ISO standards 30000–99999 (3,961 words) [view diff] exact match in snippet view article find links to article
Information technology – Process reference model (PRM) for information security management ISO/IEC 33063:2015 Information technology – Process assessment
Japan Institute for Promotion of Digital Economy and Community (354 words) [view diff] case mismatch in snippet view article find links to article
Other management systems like ISO/IEC 27001-based JIS Q 27001 Information Security Management Systems (ISMS), ISO/IEC 20000-based Information Technology
Zachman Framework (4,858 words) [view diff] case mismatch in snippet view article find links to article
Solutions. page 58. Harold F. Tipton, Micki Krause (2008). Information Security Management Handbook, Sixth Edition, Volume 2. page 263. O'Rourke, Fishman
International SOS (2,969 words) [view diff] case mismatch in snippet view article find links to article
environment, awarded ISO 27001 Certification for Best Practice in Information Security Management, CIR Risk Management Award for Event Support. International
Cybersecurity Maturity Model Certification (1,623 words) [view diff] case mismatch in snippet view article find links to article
as a prime or sub on various contracts. In 2002 the Federal Information Security Management Act required each federal agency in the United States to develop
KERIS (1,290 words) [view diff] case mismatch in snippet view article find links to article
Analytics based on Big data). December 2015 Certified with ISMS (Information Security Management System Certification). January 2016 Mr. Seog-Soo Han takes
ISO/IEC 27019 (269 words) [view diff] exact match in snippet view article find links to article
27019:2013 Information technology — Security techniques — Information security management guidelines based on ISO/IEC 27002 for process control systems
Central Information Technology Office (748 words) [view diff] case mismatch in snippet view article find links to article
7newsbelize.com. Retrieved 2016-02-26. "G.O.B. Certified in Information Security Management | Channel5Belize.com". edition.channel5belize.com. Retrieved
EIA-649 National Consensus Standard for Configuration Management (1,085 words) [view diff] case mismatch in snippet view article find links to article
org. Tipton, Harold F.; Krause, Micki (30 December 2003). Information Security Management Handbook, Fifth Edition. CRC Press. ISBN 9781135492335. "National
1234 (number) (174 words) [view diff] case mismatch in snippet view article
In Johnstone, M. (ed.). The Proceedings of 14th Australian Information Security Management Conference. Perth, Australia: Edith Cowan University. pp. 21–29
Rift Valley Technical Training Institute (730 words) [view diff] case mismatch in snippet view article find links to article
Center ICT Infrastructure Performance Contracting Quality and Information Security Management Examination Department Research Innovation and Development
National Communication Authority of Somalia (1,182 words) [view diff] case mismatch in snippet view article find links to article
security more ISO Certificatios including ISO 27001:2022 - Information Security Management System (ISMS), and ISO 27701:2019 - Privacy Information Management
Georgios Magklaras (1,340 words) [view diff] case mismatch in snippet view article find links to article
WG11.1/WG11.2 Eighth Annual Working Conference on Advances in Information Security Management & Small Systems Security, Pages: 87 - 98, Year of Publication:
OBI Pharma, Inc. (975 words) [view diff] exact match in snippet view article find links to article
2023, OBI Pharma obtained ISO/IEC 27001 certification for information security management. 2023, OBI Pharma and its subsidiary, OBIGEN Pharma Biotech
Reed Tech (703 words) [view diff] case mismatch in snippet view article find links to article
won a 2010 CIO100 Award. The company also achieved Federal Information Security Management Act (FISMA) certification for its data center operations in
Information-Technology Engineers Examination (1,184 words) [view diff] case mismatch in snippet view article find links to article
knowledge and skills for promoting the safe utilization of IT Information Security Management Examination SG Fundamental knowledge and skills Fundamental
Standardisation Testing and Quality Certification (2,085 words) [view diff] case mismatch in snippet view article find links to article
both products and management systems, covering ISO/IEC 27001 Information Security Management System Certification, Product Safety Certification based on
Tone at the top (2,983 words) [view diff] exact match in snippet view article find links to article
2308/bria-50918. Krause, edited by Harold F. Tipton, Micki (2000). Information security management handbook, v. 3 (6th ed.). Boca Raton, Fl: Auerbach. pp. 133–134
NIST SP 800-53 (3,532 words) [view diff] case mismatch in snippet view article find links to article
800-53 is built to lay out responsibilities in the Federal Information Security Management Act (FISMA). Further controls were accessed and utilized in
Scoro (2,477 words) [view diff] exact match in snippet view article find links to article
integration features, including: ISO 27001 certification for information security management SSO/SAML authentication for secure user access Granular permission
List of cyber warfare forces (8,652 words) [view diff] case mismatch in snippet view article find links to article
Operations Division (División de Operaciones de Ciberdefensa) Information Security Management Division (División de Gestión de Seguridad Informática) Investigation
ISO/IEC 27017 (1,872 words) [view diff] exact match in snippet view article find links to article
It belongs to the ISO/IEC 27000 family that talks about information security management systems (ISMS) and related practice controls. Wikipedia+1.
Nigel Howard Croft (1,576 words) [view diff] case mismatch in snippet view article find links to article
Management), ISO 22000 (Food Safety Management), ISO 27001 (Information Security Management), ISO 37001 (Anti-Bribery Management) and ISO 45001 (Occupational
List of ISO standards 10000–11999 (10,268 words) [view diff] exact match in snippet view article find links to article
specifying flowmeter performance ISO/TR 11633 Health informatics – Information security management for remote maintenance of medical devices and medical information
PCloud (962 words) [view diff] case mismatch in snippet view article find links to article
Quality Management Systems and ISO 27001:2013 certification for Information Security Management Systems. It is certified for GDPR compliance and holds SSAE
Aliyu Aziz (1,115 words) [view diff] case mismatch in snippet view article find links to article
April 2019, Aziz obtained, the highest global standards of Information Security Management System for the commission, in its determination to ensure the
International Business School, Botevgrad (1,004 words) [view diff] exact match in snippet view article find links to article
sector management, Tourism management, Security management, Information security management, Event management, Resort & SPA management. IBS is accredited
List of acts of the 107th United States Congress (187 words) [view diff] case mismatch in snippet view article find links to article
Act of 2002; Cyber Security Enhancement Act of 2002; Federal Information Security Management Act of 2002; Homeland Security Information Sharing Act; Protection
Etiometry (950 words) [view diff] exact match in snippet view article find links to article
FDA, Health Canada, ANVISA. ISO/IEC 27001 Global Certified information security management system. SOC 2 Type II USA Independent audit of security controls
List of ISO standards 16000–17999 (7,206 words) [view diff] case mismatch in snippet view article find links to article
Information technology - Security techniques - Code of Practice for Information Security Management (superseded by ISO/IEC 27002) ISO 17800 Building environment
Deepening the reform of the Party and state institutions (4,664 words) [view diff] case mismatch in snippet view article find links to article
institution with two names". The National Computer Network and Information Security Management Center was transferred from the Ministry of Industry and Information