Domain

IT Operations Knowledge – Page 57

IT Security Basics

An overview of information technology security – define information security, detail functional areas, discuss security standards and regulations, describe testing techniques for IT security audits, and information security organization maturity levels. This presentation also presents case studies to illustrate theory being practiced.

Creating a Security Baseline for Windows

Security baselines allow companies to stay in compliance with industry standards and maintain a reasonable level of security assurance. This presentation discusses the creation of a security baseline for a windows based environment.

Automating ISO 27002

This presentation discusses technologies for implementing ISO 27002 processes and controls – which technologies to use? where to start?

Application Selection Strategy

This presentation discusses a framework for application selection for ERP, SCM and CRM. It introduces the concept of business discontinuities and how to bridge/leverage them with technology solutions.

Hacking 101

This presentation describes the key vulnerabilities in web applications and discusses how to protect against the next attack.

Best Practices for Acquiring IT as a Service

This paper brings together the collective inputs of industry experts to highlight unique contracting requirements related to cloud computing contracts that can help effectively and safely procure cloud services. <br /><br />Although this paper has been written for the federal government, its content is universally application.

Rethinking the Cloud

Or thinking about it for the very first time! This presentation makes a case for cloud computing.

Cloud Migration Strategies

This presentation discusses the results of a CIO Survey with a focus on the five strategies to migrate applications to the cloud – Rehost, Refactor, Revise, Rebuild or Replace.

IAM Strategies in Healthcare IT

Identity Management in Health Information Technology

This analysis dives into the complexities of Identity and Access Management (IAM) in Health IT, highlighting the impact of fragmented identity practices on data privacy, security, and operational efficiency. It provides strategic solutions for CIOs, including leveraging frameworks like CMS Medicaid IT Architecture (MITA) and collaborating across federal and state levels. By adopting standards-based IAM systems, healthcare organizations can enhance interoperability, reduce costs, and ensure compliance with evolving regulations. Use this comprehensive guide to transform your healthcare identity management approach and secure your data ecosystem.

CIO Portal