ISACA Journal: Privacy in Practice , Vol. 2, 2021
COLUMNS
1. Information Security Matters: Keeping Secrets. --Steven J. Ross, CISA, CDPSE, AFBCI, CISSP, MBCP
2. IS Audit in Practice: Relinquishing Privacy to Research. --Cindy Baxter, CISA, ITIL Foundation
3. The Bleeding Edge: The Boxes of Pandora and Schrodinger. --Dustin Brewer, CISM, CSX-P, CDPSE, CEH
4. Innovation Governance: Privacy Innovations. --K. Brian Kelley, CISA, CSPO, MCSE, Security+
FEATURES
1. A Guide to Selecting and Adopting a Privacy Framework. --Minaz Khan, CISA, CIPT
What Is Your Privacy and Data Protection Strategy?. --Corlane Barclay, Ph.D., PMP
2. Varying Standards of Censorship and Privacy in an Interconnected World. --William Emmanuel-Yu, Ph.D., CRISC, CISM, CISSP, CSSLP
2. Need Signal: Information Privacy Equipoise. --Patrick Offor, Ph.D.
3. Case Study: Building a Zero Trust Architecture to Support an Enterprise. --Katie Teitler
4. The Gentle Art of Password Management. --David Trepp and Joshua Schmidt, CEH, CPT
5. The Dark Web and the Role of Secure Human Behaviors. --Babur Kohy, Warren D. Holston and Ibrahim Waziri Jr., Ph.D.
PLUS
1. Crossword Puzzle. --Myles Mellor
2. CPE Quiz
3. ISACA Bookstore Supplement
1. Information Security Matters: Keeping Secrets. --Steven J. Ross, CISA, CDPSE, AFBCI, CISSP, MBCP
2. IS Audit in Practice: Relinquishing Privacy to Research. --Cindy Baxter, CISA, ITIL Foundation
3. The Bleeding Edge: The Boxes of Pandora and Schrodinger. --Dustin Brewer, CISM, CSX-P, CDPSE, CEH
4. Innovation Governance: Privacy Innovations. --K. Brian Kelley, CISA, CSPO, MCSE, Security+
FEATURES
1. A Guide to Selecting and Adopting a Privacy Framework. --Minaz Khan, CISA, CIPT
What Is Your Privacy and Data Protection Strategy?. --Corlane Barclay, Ph.D., PMP
2. Varying Standards of Censorship and Privacy in an Interconnected World. --William Emmanuel-Yu, Ph.D., CRISC, CISM, CISSP, CSSLP
2. Need Signal: Information Privacy Equipoise. --Patrick Offor, Ph.D.
3. Case Study: Building a Zero Trust Architecture to Support an Enterprise. --Katie Teitler
4. The Gentle Art of Password Management. --David Trepp and Joshua Schmidt, CEH, CPT
5. The Dark Web and the Role of Secure Human Behaviors. --Babur Kohy, Warren D. Holston and Ibrahim Waziri Jr., Ph.D.
PLUS
1. Crossword Puzzle. --Myles Mellor
2. CPE Quiz
3. ISACA Bookstore Supplement
Ross, Steven J. - Personal Name
Trepp, David - Personal Name
Teitler, Katie - Personal Name
Offor, Patrick - Personal Name
Emmanuel-Yu, William - Personal Name
Barclay, Corlane - Personal Name
Khan, Minaz - Personal Name
Kelley, K. Brian - Personal Name
Brewer, Dustin - Personal Name
Baxter, Cindy - Personal Name
Mellor, Myles - Personal Name
Kohy, Babur - Personal Name
Trepp, David - Personal Name
Teitler, Katie - Personal Name
Offor, Patrick - Personal Name
Emmanuel-Yu, William - Personal Name
Barclay, Corlane - Personal Name
Khan, Minaz - Personal Name
Kelley, K. Brian - Personal Name
Brewer, Dustin - Personal Name
Baxter, Cindy - Personal Name
Mellor, Myles - Personal Name
Kohy, Babur - Personal Name
Vol. 2, 2021
1944-1967
e-Journal TI
Inggris
ISACA
2021
USA
59 hlm
LOADING LIST...
LOADING LIST...