Critical Security Audit Considerations
This article will address specific policies, procedures, and methods related to the security portion of an information technology internal audit.
Published on February 25, 2013
Outsourcing and Privacy
This article discusses the 10 critical questions management should ask about outsourcing and discusses specific privacy concerns associated with outsourcing.
Published on January 16, 2014
Results per page