Showing 1 - 10 of 17 results for the Author - julia h. allen , Type - White Paper
In this paper, Julia Allen provides guidelines for answering this question, including means for determining adequate security based on risk.
In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.
In this paper, Julia Allen identifies indicators that organizations are addressing security as a governance and management concern, at the enterprise level.
In this paper, Julia Allen provides references related to governance and management.
In this paper, Julia Allen provides a list of references related to deployment and operations.
In this paper, Julia Allen describes the key relationship between IT processes and security controls.
In this paper, Julia Allen provides a brief overview of deployment and operations security issues and advice for using related practices.
In this paper, Julia Allen discusses the role that risk management and risk assessment play in choosing which security practices to implement.
In this paper, Julia Allen describes six
In this paper, Julia Allen presents a summary of ten leading sources of security practice definition and implementation guidance.