How secure are chat and webconf tools

il y a 3 ans 104 Vues

Advantages of privacy by design in IoE

il y a 8 ans 2320 Vues

Cybersecurity governance existing frameworks (nov 2015)

il y a 8 ans 863 Vues

Cybersecurity nexus vision

il y a 8 ans 1060 Vues

ISACA Reporting relevant IT risks to stakeholders

il y a 8 ans 547 Vues

Cloud security lessons learned and audit

il y a 8 ans 882 Vues

Value-added it auditing

il y a 8 ans 572 Vues

ISACA Internet of Things open forum presentation

il y a 8 ans 917 Vues

The value of big data analytics

il y a 8 ans 730 Vues

Social media risks and controls

il y a 8 ans 1402 Vues

The view of auditor on cybercrime

il y a 8 ans 445 Vues

ISACA Mobile Payments Forum presentation

il y a 8 ans 1113 Vues

Belgian Data Protection Commission's new audit programme

il y a 8 ans 305 Vues

ISACA Cloud Computing Risks

il y a 8 ans 592 Vues

Information security awareness (sept 2012) bis handout

il y a 11 ans 1782 Vues

ISACA smart security for smart devices

il y a 11 ans 8120 Vues

Securing big data (july 2012)

il y a 11 ans 487 Vues

Valuendo cyberwar and security (jan 2012) handout

il y a 12 ans 394 Vues

How to handle multilayered IT security today

il y a 12 ans 373 Vues