91ÖÆÆ¬³§

Tagged - Policy

End-User Computing Focus Group Survey

Gain a better grasp on what end users expect from end-user computing.

Data Provenance Policy

The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through improper sourcing, misuse,...

Data Entry Policy

The integrity and quality of data and evidence used to inform decision making is central to both the short-term and long-term health of the organization.

91ÖÆÆ¬³§ing an Enterprise IT Security Training Program

Over 50% of security breaches are a result of end-user error, oversight, and ignorance. IT security training is an effective method of reducing end-user related security...

IT Security Training Tool

In order to create an effective IT security training program, you must make a series of key decisions based on information gathered during the Establishing Training...

Establishing Training Parameters Template

There are many factors that affect an organization's IT security training needs and goals: environment, specific security threats, and end-user perceptions and knowledge....

IT Security Manager

The IT Security Manager performs two core functions for the enterprise. The first is overseeing the operations of the enterprise's security solutions through management of...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us