Showing 1 - 10 of 17 results for the Author - julia h. allen , Type - White Paper
In this paper, Julia Allen provides guidelines for answering this question, including means for determining adequate security based on risk.
In this paper, Julia Allen identifies indicators that organizations are addressing security as a governance and management concern, at the enterprise level.
In this paper, Julia Allen provides references related to governance and management.
In this paper, Julia Allen provides a list of references related to deployment and operations.
In this paper, Julia Allen describes the key relationship between IT processes and security controls.
In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.
In this paper, Julia Allen describes six assets or requirements of being in business that can be compromised by insufficient security investment.
In this paper, Julia Allen discusses the role that risk management and risk assessment play in choosing which security practices to implement.
In this paper, Julia Allen provides a brief overview of deployment and operations security issues and advice for using related practices.
In this paper, Julia Allen presents a summary of ten leading sources of security practice definition and implementation guidance.