Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

FISMA

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats. FISMA was signed into law part of the Electronic Government Act of 2002.FISMA assigns responsibilities to various agencies to ensure the security of data in the federal government. The  … 
Definition continues below.
FISMAWhite Papers (View All Report Types)
 
Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
sponsored by Tripwire, Inc.
WHITE PAPER: Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

Log Management Best Practices
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA, The Security Division of EMC

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

FISMA Compliance: A Holistic Approach to FISMA and Information Security
sponsored by IBM
WHITE PAPER: IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

From Fear to Value: CIO strategies for propelling business through the economic crisis
sponsored by IBM
WHITE PAPER: Your aspiration: As a CIO, drive change, innovation and efficiency to help build a smarter enterprise that will prosper amidst global competition. Your daily challenge: As a CIO, deliver business results faster and better–with less. This whitepaper outlines key strategies for CIOs to drive business results through the economic crisis.
Posted: 18 Jun 2010 | Published: 17 Mar 2009

IBM

The Next Big Thing in AP … Positioning AP for the Future
sponsored by Kofax, Inc.
WHITE PAPER: The stress, demands and challenges that happen within accounts payable (AP) can lead to major mistakes resulting in compliance issues, or large financial blunders. This white paper discuses ways to automate business processes within accounts payables departments.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

Kofax, Inc.

Networking Compliance
sponsored by Dell, Inc.
WHITE PAPER: This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

Dell, Inc.

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions
sponsored by AccessData Group
WHITE PAPER: The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Posted: 11 Apr 2011 | Published: 06 Apr 2011

AccessData Group

Transforming Healthcare Delivery with Analytics
sponsored by IBM
WHITE PAPER: In this white paper, learn how data mining and statistical analysis can dramatically improve patient care and satisfaction without stretching your budget.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

IBM
 
 
FISMA DEFINITION (continued): …  act requires program officials, and the head of each agency, to conduct annual reviews of information security programs, with the intent of keeping risks at or below specified acceptable levels in a cost-effective, timely and efficient manner. The National Institute of Standards and Technology ( NIST ) outlines nine steps toward compliance with FISMA: Categorize the information to be protected. Select minimum baseline controls. Refine controls using a risk assessment procedure. Document the controls in the system security plan. Implement security controls in appropriate information systems. … 
FISMA definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement