security-audit-internal-audit.com
The Security Audit Shop - Data Protection Act
http://www.security-audit-internal-audit.com/legislation.htm
AUDITING AGAINST THE DATA PROTECTION ACT. The DPA Toolkit comprises checklists, policies and questionnaires, as well as a guide and a task list, to help you manage Data Protection legislation. Is a useful collection of documents to assist in understanding, and meeting the requirements of the Data Protection Act. Each item included is tried and trusted in a substantial number of organizations. Essentially what you need to do. To help you to fully comply. To help you audit against the DPA requirements.
auditbox.net
Security Audit Tools: e-Security Toolkit
http://www.auditbox.net/e-security.htm
E-SECURITY AUDIT : THE E-SECURITY TOOLKIT. Is designed specifically to help you review and audit a modern networked system. It includes a variety of checklists and questionnaires, each focusing upon a different aspect or area of the overall system. Examples of some of the issues covered include the following:. The toolkit itself is provided as a download, both in PDF and MS-Word formats (the latter to enable edit and change). It is currently priced at just $99.
security-audit-internal-audit.com
The Security Audit Shop - e-Security Audit
http://www.security-audit-internal-audit.com/network.htm
AUDIT CHECKLISTS and QUESTIONNAIRES FOR E-SECURITY. The e-Security Toolkit comprises security checklists and questionnaires covering network/LANs, firewalls, internet access, data access, virus management, etc. Is a valuable collection of electronic items and documents to assist in auditing common elements of an e-commerce or network based system. Each item included is tried and trusted in a variety of organizations, across the world. A LAN/Network security questionnaire. A firewall audit questionnaire.
security-audit-internal-audit.com
The Security Audit Shop - Small Audit Invitiation
http://www.security-audit-internal-audit.com/invitation.htm
SMALL AUDIT PROGRAMS and CHECKLISTS. The Security Audit Shop. Is shortly to feature a series of small audit programs focusing upon specific technologies and areas. If you own a program or checklist which might be suitable, please contact us. Return To Main Page. You can order ALL the plans and checklists from here. A directory of information security policies and related information is maintained by the Information Security Policies Group. The Security Audit Shop.
security-audit-internal-audit.com
The Security Audit Shop - The Information Security manual
http://www.security-audit-internal-audit.com/manual.htm
The Interactive Security Manual. Covers roles, responsibilities, security administration, management. essentially many of the areas which are often overlooked or not given sufficient focus. THE INTERACTIVE INFORMATION SECURITY MANUAL. The Security Manual is a key document in the information security process. it is a guide, an aid and a reference point for security. It also defines a number of key processes. It is therefore essential that this it is of the highest quality. Return To Main Page.
listofcompanies.org
Companies in Belgium. List of Companies in Belgium
http://www.listofcompanies.org/Companies/Belgium
LIST OF ALL COMPANIES. Find and discover all companies by name, category or industry. List of 825.117 companies in Belgium. 1 Assistance Training and Consulting. 2 By 2 Nv. 3si Security Systems Nv. 4 D Diamonds Nv. Rue De Henri-Chapelle 16. A and C Noyens Nv. A and C Systems Bvba. A and D Dental Technics. A and E Security Nv. A and E Security Nv. A and E Security Nv. A and G Summerpools. A and O International Bvba. Avenue Des Communaut,s 3. Rue De Renory 499. A La Bonne Heure Au Sablon Sprl. A N C Bvba.
security-audit-internal-audit.com
ISO17799, ISO 17799 Audit
http://www.security-audit-internal-audit.com/iso17799.htm
ISO 17799 Consultant is actually more than a checklist or plan. It is a sophisticated software product which measures compliance and identifies exceptions against ISO17799. The standard itself is also available for a manual approach. Was designed specifically to make compliance with ISO17799 easier and more straightforward. Explain your current compliance position with respect to each section of ISO17799. THE ISO 17799 STANDARD. Return To Main Page. You can order ALL the plans and checklists from here.
security-audit-internal-audit.com
The Security Audit Shop - Information Security Policies & Risk Analysis
http://www.security-audit-internal-audit.com/rusecure.htm
SECURITY POLICY and RISK BASED AUDIT. Often security policy is audited against - assuming there is one! If not, the leading off-the-shelft player is RUsecure. For strict risk based audit, via risk assessment, COBRA is the established front runner. RUSECURE INFORMATION SECURITY POLICIES. You can now procure a comprehensive and up to date set of information security policies off the shelf. These are shipped in PDF and Word formats, and so can be tailored to meet specific or individual needs.