Most linked-to categories

From GCA ACT
Jump to navigationJump to search

Showing below up to 50 results in range #701 to #750.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. CIS - 11.1 - Recover - Data - Establish and Maintain a Data Recovery Process‏‎ (1 member)
  2. CIS - 18.1 - Identify - Establish and Maintain a Penetration Testing Program‏‎ (1 member)
  3. CIS - 12.1 - Protect - Network - Ensure Network Infrastructure is Up-to-Date‏‎ (1 member)
  4. CIS - 16.11 - Protect - Applications - Leverage Vetted Modules or Services for Application Security Components‏‎ (1 member)
  5. CIS - 11.2 - Recover - Data - Perform Automated Backups‏‎ (1 member)
  6. Order Taking Devices‏‎ (1 member)
  7. DE.AE-5: Incident alert thresholds are established‏‎ (1 member)
  8. PR.DS-7: The development and testing environment(s) are separate from the production environment‏‎ (1 member)
  9. CIS - 13.4 - Protect - Network - Perform Traffic Filtering Between Network Segments‏‎ (1 member)
  10. RS.IM-2: Response strategies are updated‏‎ (1 member)
  11. Legal Considerations in Incident Response‏‎ (1 member)
  12. CIS - 15.3 - Identify - Classify Service Providers‏‎ (1 member)
  13. CIS - 18.4 - Protect - Network - Validate Security Measures‏‎ (1 member)
  14. CIS - 13.3 - Detect - Network - Deploy a Network Intrusion Detection Solution‏‎ (1 member)
  15. CIS - 16.1 - Protect - Applications - Establish and Maintain a Secure Application Development Process‏‎ (1 member)
  16. CIS - 17.2 - Respond - Establish and Maintain Contact Information for Reporting Security Incidents‏‎ (1 member)
  17. CIS - 1.1 - Identify - Devices - Establish and Maintain Detailed Enterprise Asset Inventory‏‎ (1 member)
  18. Cryptocurrency‏‎ (1 member)
  19. CIS - 8.11 - Detect - Network - Conduct Audit Log Reviews‏‎ (1 member)
  20. CIS - 4.8 - Protect - Devices - Uninstall or Disable Unnecessary Services on Enterprise Assets and Software‏‎ (1 member)
  21. RS.AN-5: Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)‏‎ (1 member)
  22. Donation Card Dip Stations‏‎ (1 member)
  23. CIS - 5.4 - Protect - Users - Restrict Administrator Privileges to Dedicated Administrator Accounts‏‎ (1 member)
  24. CIS - 12.2 - Protect - Network - Establish and Maintain a Secure Network Architecture‏‎ (1 member)
  25. CIS - 3.2 - Identify - Data - Establish and Maintain a Data Inventory‏‎ (1 member)
  26. What are Digital Wallets?‏‎ (1 member)
  27. CIS - 4.7 - Protect - Users - Manage Default Accounts on Enterprise Assets and Software‏‎ (1 member)
  28. CIS - 12.8 - Protect - Devices - Establish and Maintain Dedicated Computing Resources for All Administrative Work‏‎ (1 member)
  29. Debit Cards‏‎ (1 member)
  30. Online Reputation Management‏‎ (1 member)
  31. CIS - 2.1 - Identify - Applications - Establish and Maintain a Software Inventory‏‎ (1 member)
  32. Donor Information‏‎ (1 member)
  33. Financial Data‏‎ (1 member)
  34. PR.AT-4: Senior executives understand their roles and responsibilities‏‎ (1 member)
  35. Physical Device Security‏‎ (1 member)
  36. RS.AN-4: Incidents are categorized consistent with response plans‏‎ (1 member)
  37. Security Testing‏‎ (1 member)
  38. Commercially Available Monitoring Software‏‎ (1 member)
  39. Unsecured Loans‏‎ (1 member)
  40. ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.‏‎ (1 member)
  41. Mobile-Friendly Applications‏‎ (1 member)
  42. PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools‏‎ (1 member)
  43. Centralized Exchange Withdrawal Policies‏‎ (1 member)
  44. What is Digital Currency?‏‎ (1 member)
  45. Identity as a Service (IDaaS)‏‎ (1 member)
  46. NIST CSF v1.1‏‎ (1 member)
  47. Business Accounts with Suppliers‏‎ (1 member)
  48. Security Awareness Testing‏‎ (1 member)
  49. Regular Software Updates‏‎ (1 member)
  50. Infrastructure as a Service (IaaS)‏‎ (1 member)

View ( | ) (20 | 50 | 100 | 250 | 500)