Tags: it*

21 bookmark(s) - Sort by: Date ↓ / Title /

  1. "The net messages in all of this –

    A vendor that takes information security this serious probably deserves to be instantly added to your short-list, provided they have the requisite skill and experience in the products and services you seek.
    There are likely substantial vendor due diligence and annual re-certification expenses you can save as well. If a vendor can pass the SOC 2 Type II audit, there is little you will review that will trip them up. They have endured far worse. Just ask for their SOC 2 Type II report and certification documentation, review it to ensure your own comfort, then check the “Exceeds Requirements” box, and move on to the next vendor to review.
    Yes, we are essentially saying that SOC 2 Type II vendors should be given a “free pass” (of sorts). Give them an explicit opportunity to strut their stuff in your RFP process. And, by no means was it FREE. It has cost them dearly, but they think earning your business and peace of mind is worth it."
    https://www.mpamag.com/news/the-impor...ations-in-vendor-sourcing-108901.aspx
    Tags: , , , , by dnorman (2018-11-16)
  2. "In short, you must be able to cover not only security of the cloud (the cloud provider’s infrastructure), but also security in the cloud (how you configure and use the cloud infrastructure and services, as well as your applications and data) and security outside of the cloud (your software development processes, user endpoint devices, training and awareness, etc.)"
    https://jupiterone.io/blog/what-is-soc2-compliance
    Tags: , , , by dnorman (2018-11-16)
  3. how to add a Mac to the managed devices program
    https://ucalgary.service-now.com/it?i...s_id=62ae173413d7b2409b4b3b27d144b037
    Tags: , by dnorman (2018-08-10)
  4. -
    https://ecs.ucalgary.ca/projects/it/723/SitePages/Home.aspx
    Tags: , , by dnorman (2017-03-29)
  5. Installer to get campus-owned macs on the network as officially managed devices.
    http://www.ucalgary.ca/it/macmanagement
    Tags: , , , by dnorman (2016-07-16)
  6. The Mac enterprise management system we're deploying
    https://www.jamfsoftware.com/solutions/business
    Tags: , , by dnorman (2016-07-01)
  7. -
    http://www.cio.gov.bc.ca/cio/priv_leg/foippa/guides_forms/guide_index.page
    Tags: , , , by dnorman (2016-01-26)
  8. -
    http://www.ucalgary.ca/it/forms/d2l/create
    Tags: , , , by dnorman (2013-11-19)
  9. A responsibility assignment matrix 1 » (RAM), also known as RACI matrix 2 » /ˈreɪsiː/ or linear responsibility chart 3 » (LRC), describes the participation by various roles in completing tasks or deliverables for a project or business process. 4 » It is especially useful in clarifying roles and responsibilities in cross-functional/departmental projects and processes. 5 »
    RACI is an acronym that was derived from the four key responsibilities most typically used: Responsible, Accountable, Consulted, and Informed. 6 »
    http://en.wikipedia.org/wiki/Responsibility_assignment_matrix
  10. -
    http://www.ucalgary.ca/policies/files...20Information%20Assets%20Policy_0.pdf
    Tags: , , , by dnorman (2013-03-26)

Top of the page

First / Previous / Next / Last / Page 1 of 3 Linky linky...: tagged with "it"

About - Propulsed by SemanticScuttle