Virtualization and Security
This presentation provides an introduction to virtualization, virtualization architecture, key risks with virtualization, specific audit concerns and recommendations for evaluation of a virtualized environment.
This presentation provides an introduction to virtualization, virtualization architecture, key risks with virtualization, specific audit concerns and recommendations for evaluation of a virtualized environment.
This presentation introduces the Common Criteria Evaluation and Certification Scheme, or CCS – an independent evaluation and certification service for measuring the security assurance and functionality claims of Information and Communications Technology (ICT) products and systems. What is it? Why is it important to you?
This presentation provides an overview of cyber forensics – what is forensics? what is cyber forensics? who uses cyber forensics? what are the skills needed for cyber forensics?
This paper explores the silver lining in the cloud revolution – it explains some of the key considerations for using cloud computing services in healthcare organizations (HCOs), hospitals, and integrated delivery networks.
This presentation discusses using the agile methodology in IT financial management projects – What is Agile Project Management? What is the Scrum project management framework? How can it be applied to an IT Financial Management project? Where can I get more information?
This paper discusses security risk analysis – what is security risk analysis? why perform a security risk assessment? how to conduct a security risk assessment? when to perform a security risk analysis?
This guide offers CIOs a structured approach to implementing Agile Project Management in IT Financial Management initiatives, covering principles, team roles, planning, and execution steps to improve project success rates.
Gain insights into the convergence of IT security and compliance, understanding the role of governance and technology trends in shaping modern IT strategies.
This presentation paints a picture of the emerging threats to the worldwide payment processing systems and discusses how a major payment processor – Visa – works to keep its payment network secure from increasingly sophisticated attacks.
This presentation discusses information security and compliance risk management – what is it? why do it? – and introduces a framework to implement it in the healthcare industry.