Compliance Program
Appropriate monitoring and logging of network activities exists to control the flow of data within and between networks including detection systems to restrict access and use of networked resources
Showing 1–12 of 118 results
-
Assessment of IT Application Controls
$50.00 Add to cart -
Audit Checklist for ICT Design Program
$150.00 Add to cart -
Audit Checklist for ICT Project Build Phase
$75.00 Add to cart -
Audit Checklist for ICT Project Concept Phase
$75.00 Add to cart -
Audit Checklist for ICT Project Implementation Phase
$75.00 Add to cart -
Audit Checklist for ICT Project Management Program
$150.00 Add to cart -
Audit Checklist for ICT Project Risk Assessment
$150.00 Add to cart -
Audit Checklist for ICT Test Execution Program
$75.00 Add to cart -
Audit Checklist for ICT User Requirements Program
$75.00 Add to cart -
Basic Assessment of IT Application Management
$50.00 Add to cart -
Best Practices for Cyber Resilience
$75.00 Add to cart -
Charter for Information Security Committee
$50.00 Add to cart
Showing 1–12 of 118 results