Compliance Tag Directory

Browse Alphabetically:

Featured Compliance Questions

  • SparePoint Online Governance

    Does anyone have a SharePoint Online governance plan?

    MargieK20025 pointsBadges:
  • Responsibilities of IT Governance

    What are the responsibilities of IT governance? I have very few duties. I want to expand this job with many responsibilities. Please help me.

    SyedAbbas10 pointsBadges:
  • SAP T-codes for IT governance

    What are the transaction codes which IT governance can use to check Segregation of duties (SoD)?

    SyedAbbas10 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • BCM vs. Risk Management

    While introducing GRC, all the risks are taken in to consideration & countermeasures are defined, why we need BCM separately?

    SanjayBirari15 pointsBadges:
  • Conduct risk assessment on PCs and networks

    I want to how to conduct a risk assessment to protect our PCs and networks.

    M20085 pointsBadges:
  • Project Governance Chart

    Does anyone know of a sample governance chart?

    DebW5 pointsBadges:
  • What is the best way to implement a risk assessment in an IT department that will align COBIT controls with risks?

    A compliance officer in Europe could use some advice from fellow IT professionals and executives. His IT budget is being scrutinized, as is the case in every organization in 2009; he needs targets to get things done more efficiently but without taking on more risk. His department is evaluating...

    AlexanderHoward15 pointsBadges:
  • How to perform network audit or assessment

    How can I perform a network audit or assessment?

    Apalani20045 pointsBadges:
  • Is Outlook 2007 IRM HIPAA compliant?

    Trying to figure out if by using Permissions in Outlook 2007 to encrypt and password protect information--it that considered HIPAA compliant?

    ITKE1,042,905 pointsBadges:
  • Industry standard SOX audit checklist?

    Working through SOX compliance issues with updated infrastructure, documented interfaces, reviewed controls and on and on -- but is there an industry SOX audit checklist to show exactly what auditors are looking for concerning compliance? If so, would someone point me to it? Thank you. Moderator...

    BrentSheets6,940 pointsBadges:
  • Free IT Book: Stealing the Network

    This week's free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a...

    MelanieYarbrough6,345 pointsBadges:
  • Auditing Feature

    Anyone know the best source (Slides,Simulation,Graphical representation) from which I totally get guideline how to use auditing and Even viewers feature in Windows Server 2003. Thanks Muhammad Usman

    Muhammad usman125 pointsBadges:
  • Checklists for Router, Firewall and Switch security

    I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.

    ISMS130 pointsBadges:
  • HIPAA Compliant Server in Amazon EC2

    Hi, I have an instance in Amazon EC2 and need to be HIPAA compliant. I have two doubts, 1. Should I need to do a block level encryption of the database storage. 2. Should I need to encrypt sensitive data before storing in the database. 3. Best database software to handle with the encryption Any...

    Rinshad5 pointsBadges:
  • Security Audit

    what form or procedeure would you use for a final security Audit after the Avaya system is installed?

    HubeHube20 pointsBadges:
  • Information on IT Auditing

    Where can I get the information on IT auditing from this site? Thank You.

    ss38135 pointsBadges:
  • PDCA with conflicting laws

    Hello, I'm a student at the University of Advancing Technology (UAT) and this week we've been learning about the Plan, Do, Check, Act methodology for implementing an information management security system. Our reading explains about PDCA and how an organization should use it to obtain an ISO 27001...

    Griff137130 pointsBadges:
  • Governance of IT Assets

    I'm looking for example templates that could be used to provide an IT Governance Board with the assurance that it's IT assets are being managed appropriately and not exposed to any unnecessary risks.

    MarkCarlyle5 pointsBadges:
  • EU security directive

    Where can I find implementation details for complying with EU directive 95/46/ec?

    InfPB5 pointsBadges:

Browse Alphabetically:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following