Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

FISMA

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats. FISMA was signed into law part of the Electronic Government Act of 2002.FISMA assigns responsibilities to various agencies to ensure the security of data in the federal government. The  … 
Definition continues below.
FISMAWhite Papers (View All Report Types)
 
The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

FISMA Compliance: A Holistic Approach to FISMA and Information Security
sponsored by IBM
WHITE PAPER: IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Log Management Best Practices
sponsored by RSA
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA

Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
sponsored by Tripwire, Inc.
WHITE PAPER: Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

Why Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks
WHITE PAPER: This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks

The Growing Importance of E-Discovery on Your Business
sponsored by Google Apps
WHITE PAPER: The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

Google Apps

Oracle Accelerate - Not Just Smart but Timely
sponsored by Oracle Corporation
WHITE PAPER: This paper gives you an overview of how Ovum has helped penetrate the upper-midmarket. Even when the slowing growth of the market hasn't.
Posted: 24 Sep 2009 | Published: 01 Mar 2009

Oracle Corporation

Roadmap to Effective eGovernment
sponsored by EMC Corporation
WHITE PAPER: Learn how roadmap to effective eGovernment provides you with a pragmatic, manageable and cost-effective guide to identify which pieces of your information infrastructure can be strengthened to become a high-performance government agency.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

EMC Corporation

Infographic: Bridging the Gap Between Business and IT
sponsored by IBM
WHITE PAPER: This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM
 
 
FISMA DEFINITION (continued): …  act requires program officials, and the head of each agency, to conduct annual reviews of information security programs, with the intent of keeping risks at or below specified acceptable levels in a cost-effective, timely and efficient manner. The National Institute of Standards and Technology ( NIST ) outlines nine steps toward compliance with FISMA: Categorize the information to be protected. Select minimum baseline controls. Refine controls using a risk assessment procedure. Document the controls in the system security plan. Implement security controls in appropriate information systems. … 
FISMA definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement