Skip to main content

Home/ Dogs-to-Stars Enterprises/ Group items tagged government

Rss Feed Group items tagged

Scott Edelman

Infosecurity (USA) - ISACA launches risk management certification - 0 views

  • Security organization ISACA has launched a new risk management qualification for information security professionals. The Certified in Risk and Information Systems Control (CRISC) certification targets professionals in the IT area who use information security controls to manage risk in technology environments.
  • ISACA, which focuses on audit, risk, and governance disciplines, will administer the first CRISC examination next year
  • This is the fourth certification launched by ISACA. It also offers the Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), and the Certified in the Governance of Enterprise IT (CGEIT), which is its most recent certification, launched in 2006.ISACA is also the publisher of the Risk IT standard for managing risk in IT, and the COBIT standard for IT governance.
Steve King

Data.gov - 0 views

  • With so much government data to work with, developers are creating a wide variety of applications, mashups, and visualizations. From crime statistics by neighborhood to the best towns to find a job to seeing the environmental health of your community–these applications arm citizens with the information they need to make decisions every day. Enjoy these highlights of the hundreds of applications available.
Steve King

ProModel - Healthcare Solutions - 0 views

  • New Technology Evaluation and Implementation Hospitals and healthcare systems are under greater pressure than ever to improve patient care, increase staff satisfaction, control or reduce costs, and meet insurance and government regulations and live up to industry watchdog best practices. To help meet these demands, providers must continue to implement new technology as part of the solutions or risk obsolescence.
dhtobey Tobey

Cybersecurity panel: Federal CISOs must focus on worker training - FierceGovernmentIT - 0 views

  • Only 12 percent of federal CISOs worry about poorly trained users. According to an April 2010 study by the Ponemon Institute, 40 percent of all data breaches in the United States are the result of negligence, however a comparable statistic for the federal space is unavailable.
  • The Computer Security Act of 1987 requires federal agencies to "provide for the mandatory periodic training in computer security awareness and accepted computer security practices of all persons who are involved with the management, use, or operation of each Federal computer system within or under the supervision of that agency." At the NIST event, Hord Tipton, executive director of (ISC)², estimated that most federal employees only get an hour of training per year, under FISMA requirements.
  •  
    This points to a significant opportunity for deployment of the Critical Intelligence cybersecurity course, but also other eLearning systems that fulfill the requirements of the Computer Security Act.
Steve King

Knowledge Sharing Systems - 0 views

  • Transforming Technology Transfer from a Cost Center into a Profit Center Are your intellectual assets working hard enough? It’s a troubling question. Every year, universities, businesses, and government agencies lose millions of dollars in uncollected license fees, avoidable legal expenses, and missed opportunities. Even the most heroic efforts from Technology Transfer Offices aren’t enough. Constantly growing caseloads, paperwork, and reporting requirements keep them swamped. So researchers can’t access critical information. Invention disclosures and legal filings are missed. And valuable marketing opportunities fall between the cracks. KSS TechTracS® changes all this.
Steve King

The Expert Choice Team, History, and Approach - Expert Choice - 0 views

  • Over the past 25 years we have built an unparalleled set of skills in bringing the right stakeholders together to collaborate, set priorities, and move forward with confidence. Organizations are increasingly complex and geographically distributed, yet the need for close collaboration and priority-setting is more critical than ever before. The world’s most successful organizations spanning government, industry, and academia rely on Expert Choice for rapid convergence of experience, intuition, and specific data. We’ve designed our software to be quick-to-learn, easy-to-use, and rooted in how we all make decisions. Take a look at how we work with our customers to improve outcomes, reduce costs, save time, and build alignment, buy-in, and confidence.
Steve King

The Microsoft Connected Health Framework - 0 views

  • The Microsoft Connected Health FrameworkArchitecture and Design BlueprintThe Connected Health Framework - Architecture and Design Blueprint represents a vendor-agnostic set of best practices and approach based on Services Oriented Architecture (SOA), for architecting e-Health solutions for health information networks ranging from within health organizations to across multiple government agencies.
1 - 7 of 7
Showing 20 items per page