Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  


RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats. FISMA was signed into law part of the Electronic Government Act of 2002.FISMA assigns responsibilities to various agencies to ensure the security of data in the federal government. The  … 
Definition continues below.
FISMA White Papers (View All Report Types)
FISMA Compliance: A Holistic Approach to FISMA and Information Security
sponsored by IBM
WHITE PAPER: IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
Posted: 10 Jan 2011 | Published: 10 Jan 2011


Log Management Best Practices
sponsored by RSA
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007


Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
sponsored by Tripwire, Inc.
WHITE PAPER: Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

Accounts Payable Automation: 12 Steps to Kick Your Paper Habit
sponsored by Esker Inc.
WHITE PAPER: The cost of paper usage in Accounts Payable (AP) departments is high. It prevents assurance of timely and accurate payments and fails to provide your business with a competitive edge. Access this accounts payable guidebook for 12 steps to kick your paper habit.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Esker Inc.

Five Things to Know About Hyper-Convergence
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, you'll uncover the top 5 things you need to know about hyper-converged infrastructure.
Posted: 17 Jun 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

The Performance Manager: Turning Information Into Higher Business Performance
sponsored by IBM
WHITE PAPER: Download this white paper for an extensive summary of The Performance Manager, Proven Strategies for Turning Information into Higher Business Performance, a book that examines the partnership between decision-makers and the people who provide them with information to drive better decisions.
Posted: 20 Jul 2009 | Published: 14 Feb 2008


McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.
Posted: 16 Mar 2010 | Published: 16 Mar 2010


Retail Space Planning and Optimization
sponsored by FICO
WHITE PAPER: Realize significant improvements in your space planning decisions and minimize the manual effort required to create planograms. FICO gives you the right set of technology to make much more precise macro and micro store layout decisions that meet your unique business objectives. Read more to find out how.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

FISMA DEFINITION (continued): …  act requires program officials, and the head of each agency, to conduct annual reviews of information security programs, with the intent of keeping risks at or below specified acceptable levels in a cost-effective, timely and efficient manner. The National Institute of Standards and Technology ( NIST ) outlines nine steps toward compliance with FISMA: Categorize the information to be protected. Select minimum baseline controls. Refine controls using a risk assessment procedure. Document the controls in the system security plan. Implement security controls in appropriate information systems. … 
FISMA definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement