Domain

IT Operations Knowledge Archive – Page 55

Enterprise Risk Assessment

This presentation discusses the evolving threats to systems, their "true impact" and enterprise risk assessment as a discipline to respond to them.

Virtualization and Security

This presentation provides an introduction to virtualization, virtualization architecture, key risks with virtualization, specific audit concerns and recommendations for evaluation of a virtualized environment.

Introduction to Common Criteria Scheme (CCS)

This presentation introduces the Common Criteria Evaluation and Certification Scheme, or CCS – an independent evaluation and certification service for measuring the security assurance and functionality claims of Information and Communications Technology (ICT) products and systems. What is it? Why is it important to you?

Introduction to Cyber Forensics

This presentation provides an overview of cyber forensics – what is forensics? what is cyber forensics? who uses cyber forensics? what are the skills needed for cyber forensics?

Security Risk Assessment

This paper discusses security risk analysis – what is security risk analysis? why perform a security risk assessment? how to conduct a security risk assessment? when to perform a security risk analysis?

Cloud Computing for Healthcare Organizations

This paper explores the silver lining in the cloud revolution – it explains some of the key considerations for using cloud computing services in healthcare organizations (HCOs), hospitals, and integrated delivery networks.

CIO Portal