Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

The Federal Information Security Management Act of 2002

RSS Feed   
The Federal Information Security Management Act of 2002 Reports
 
Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
sponsored by Silver Tail Systems
EGUIDE: This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Silver Tail Systems

Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by Globalscape
CASE STUDY: In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013

Globalscape

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

FISMA Compliance: A Holistic Approach to FISMA and Information Security
sponsored by IBM
WHITE PAPER: IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
sponsored by Tripwire, Inc.
WHITE PAPER: Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

June Issue of Information Security magazine: Mobile Security: A New Game Plan
sponsored by Information Security Magazine
EZINE: This month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges.
Posted: 02 Jun 2011 | Published: 02 Jun 2011

Information Security Magazine

A Buyer’s Guide to Automating Personal Data Rights for CCPA and GDPR
sponsored by BigID
WHITE PAPER: With the arrival of data rights and privacy regulations, organizations face increasing pressure to maintain strategies that ensure data protection. The risks for failing to do so include financial, legal and reputational damage. Read this buyer’s guide to ensure your organization informed on the key aspects of data discovery.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

Top 10 startup stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: A persistent theme in this year's Computer Weekly startup coverage was collaboration, but this time with a particular emphasis on building ecosystems. Across Europe, startups have been pushing to build collaborative ecosystems in both the public and private sector alongside their partners. Here are Computer Weekly's top 10 startup stories of 2019.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

ComputerWeekly.com

Intelligent Inventory: How to Solve the Classic Manufacturing Dilemma
sponsored by Sage Software
WHITE PAPER: Use this manufacturer’s inventory management guide, which explores how to address 6 common inventory challenges through the support of IoT and AI systems of innovation.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Sage Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info