TechTutorials - Free Computer Tutorials  







Policy, Compliance, and Auditing Tutorials






Tutorials (35)

Total Tutorials: 6574  |  Added today: 0 Tutorials updated: 10/26/2018



Sort Tutorials By:


PCI DSS Compliance (Part 1)
 
We will cover PCI DSS compliance and how to form solutions that help your organisation become complaint.
Added: 02/22/2008, Hits: 673, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

PCI DSS Compliance (Part 2)
 
Maintaining a vulnerability management program, implementing strong access control measures and maintaining an information security policy.
Added: 02/22/2008, Hits: 647, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Review of Microsoft’s Security Risk Management Guide
 
The new Security Risk Management Guide from Microsoft provide prescriptive guidance for companies to help them learn how to implement sound risk management principles and practices for enhancing the security of their networks and information assets. This article reviews the contents of this guide and recommends other vendor-neutral resources on similar topics.
Added: 11/12/2004, Hits: 516, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Revisiting Compliance in the Cloud: Is it Risky Business? (Part 5)
 
In this, Part 5 of our series on compliance in the cloud, we provide some tips on how to prepare your technical environment for the compliance audit.
Added: 05/22/2015, Hits: 248, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Securing a Hybrid Cloud
 
Organizations migrating to the hybrid cloud model sometimes struggle due to concerns surrounding compliance, privacy and security. Hybrid clouds can be better secured through best practices applied on-premise and in other clouds.
Added: 01/18/2015, Hits: 531, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Security compliance
 
In this article we will focus on things your organisation can do in working towards compliance. This will better improve the security posture of your company whilst reducing the attack surface area.
Added: 06/26/2008, Hits: 558, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Security Series: Disaster Recovery Objectives and Milestones (Part 4 of 6)
 
In part four of the Disaster Recovery series the important project definition phase is covered, disaster recovery strategy as well as project mile stones. Importantly materials that should be stored offsite and best practice has also been highlighted.
Added: 04/01/2005, Hits: 535, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Security Series: Disaster Recovery Tactics that Ensure Business Continuity (Part 1 of 6)
 
In part one of the Disaster Recovery series potential disasters, possible events and the reason that it is vital to have a disaster recovery plan and Business continuity plan in place like an insurance policy on any valuable items are covered.
Added: 01/14/2005, Hits: 698, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Security Series: Disaster Recovery Target (Part 2 of 6)
 
In part two of the Disaster Recovery series, we will discuss information pertaining to the organization's stance on disaster recovery. Planning of DR, potential requirements, terms of availability, business continuity, the documentation there of and the continual updating of the documentation are also covered.
Added: 02/08/2005, Hits: 530, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Security Series: Final countdown tips for Disaster Recovery and Business Continuity (Part 6 of 6)
 
This article completes the DR BC series and we have covered many aspects that need to be taken into consideration when designing both a Disaster recovery and business continuity plan. WE covered documentation and the need for change control and skilled people for managing the process. We also cover some steps that can be taken now by the organization to mitigate the risk and reduce the loss of valuable data.
Added: 05/13/2005, Hits: 476, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Security Series: Formulation of the Business Continuity Plan (Part 3 of 6)
 
In part three of the Disaster Recovery series, hardware selection, potential solutions, recovery strategies and centralization of information storage have been covered. Different levels at recoveries will take place at will help organizations to become effective when a true disaster occurs are also worked through.
Added: 03/04/2005, Hits: 501, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Setting Effective Security Policies in a Consumerized IT Environment
 
How to set effective security policies in a consumerized IT environment.
Added: 10/22/2010, Hits: 383, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Top 10 Ways to Reduce the Risk of Data Leakage
 
Data is arguably the most important asset in any organization. The implications of corporate data getting into the wrong hands could potentially be catastrophic. This document is going to give you some hopefully useful tips to help you protect yourself against the risks of data leakage.
Added: 06/10/2016, Hits: 173, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Writing an Effective Security Policy (Part 1)
 
How to write an effective security policy.
Added: 12/19/2008, Hits: 480, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Writing an Effective Security Policy (Part 2)
 
How to write an effective security policy, covering elements of technical controls that should be found in the majority of policies in the world of PCI DSS, SOX, Euro SoX, Hippa and ISO 127001.
Added: 01/16/2009, Hits: 608, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating
Page:     1 2 Items Per Page:







7 Seconds Resources, Inc.




IT Showcase