Skip to page navigation menu
Skip entire header
Brown.edu
News
—
Events
—
Exhibits
—
For You
Undergraduate Students
Graduate & Medical Students
Faculty
Medical & Clinical Faculty
Alumni
Visiting Scholars
Special Collections Researchers
Library Staff
Brown Digital Repository
Off-Campus Access
My Library Account
Search
⚲
☰
×
BruKnow
Library Website
Search →
×
Feedback
Discover
Browse Collections
Deposited Content
Theses & Dissertations
Library Collections
Recently Added
About
I Want to
Upload Something
Assign a DOI
Consult on a Project
Use an API
Read FAQs
Search
Off-Campus Access
My Library Account
Borrow, Request, & Renew
Articles, Journals, & Databases
Research Help
Hours & Locations
Events
Ask a Question Now
Skip 13 subheader links
Home
Feedback
Discover ▾
Browse Collections
Deposited Content
Theses & Dissertations
Library Collections
Recently Added
About
I Want to ▾
Upload Something
Assign a DOI
Consult on a Project
Use an API
Read FAQs
Login
⚲
Top
Uploaded Content
Content added by scholars through self-service upload
Active filters
Collection
School of Professional Studies
Cancel selected facet
Refine your results
Collection
80
School of Professional Studies
67
Master of Science in Cybersecurity
12
Master of Science in Healthcare Leadership
1
IE Brown Executive MBA
Format
76
text
3
moving image
1
text_resources
Genre
1
Articles
75
Critical Challenge Project
1
Key Reflection Project
3
animations (visual works)
Keywords
1
"Network Security"
1
23 NYCYRR500
1
Accountable Care Organization (ACO)
1
Adaptive governance
1
Addiction
Show More...
×
Close
Keywords
1
"Network Security"
1
23 NYCYRR500
1
Accountable Care Organization (ACO)
1
Adaptive governance
1
Addiction
1
Aerospace
1
Affordable Care Act (ACA)
1
Agriculture technology
1
Agtech
1
Artifical Intelligence
1
Artificial intelligence (AI)
1
Assessment
1
Behavioral health
1
Beta Girl Training module
1
Big data
1
Blockchain
1
Bluetooth technology
1
Boards of Directors
1
Breach of trust
2
Bug Bounty
1
Business Case Studies
1
Business Integrated Security Roles (BISRs)
1
C-Suite
1
CCPA
1
COSO
1
Care navigation
1
Change management
1
Chief Executive Officer (CEO)
1
Children
1
Cloud computing
1
Cloud service provider
2
Commercial health insurance
1
Community benefit
1
Compliance
25
Computer security
2
Condition-specific bundled payments (CSBPs)
1
Confidential communications--Lawyers
2
Corporate governance
1
Corporate resiliency
1
Credit card fraud--Prevention
1
Critical Information Infrastructure
2
Critical infrastructure
1
Cryptography
1
Cyber Civil Support Teams (CCST)
1
Cyber Education
1
Cyber Incident Response
1
Cyber Key Terrain
1
Cyber intelligence surveillance
1
Cyber security frameworks
1
CyberScore
25
Cybersecurity
1
Cybersecurity staffing
1
Cybersecurity standards
1
Cyberwarfare
1
Data classification
1
Data governance
1
Data inventory
1
Data management
1
Data map
1
Data profile
4
Data protection
1
Data protection--Law and legislation
1
Data scandal
1
Data steward
1
Deep learning
1
Defense Federal Acquisition Regulation Supplement (DFARS)
1
Department of Defense (DoD)
1
Digital transformation
1
Distilleries
1
Due Diligence
1
Emergency Department
1
Employee Training
1
Employee retention
1
Employees--Recruiting
1
Employees--Training of
1
Encryption
1
European Commission
1
European Union
1
Executive cybersecurity
1
Executive dashboard
1
Executives
1
FFIEC
1
Facial recognition
1
Family systems
1
Federal Bureau of Investigation (FBI)
2
GDPR
1
Gap time
3
General Data Protection Regulation
3
General Data Protection Regulation (GDPR)
1
Geriatrics
1
Hackers
1
Hacking
1
Harmonization
1
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
1
Health care
1
Health care apps
1
Health care delivery
1
Healthcare policy
1
Hedge funds
1
Holistic medicine
1
Hospitals
1
IOA
1
IOC
1
ISO 27001/2
1
ITAR
1
Identity management
1
Implants
1
In-house counsel
1
Indications of Attack
1
Indications of Compromise
1
Information Security Awareness Training
1
Information Security Risk Management
1
Information storage and retrieval systems
1
Information technology--Security measures
1
Insider threat
1
Integrated practice unit
1
Integrated risk management
1
Internet data
1
Internet of Battlefield Things (IoBT)
2
Internet of Things (IoT)
1
Internet privacy
1
Israel
1
Joint Intelligence Preparation of the Operational Environment
1
Labor market
1
Laparosocpic surgery
1
Law--International unification
1
Laws
2
Leaks (Disclosure of information)
1
Lean management
1
Legal
1
Machine learning
1
Medicaid
1
Mental health
1
Metrics
1
Microchipping
1
Mobile applications
1
Mobile computing
1
NIST 800-171
1
NIST 800-53
1
NIST Cybersecurity framework
1
Nanoelectronics
1
National Association Corporate Directors (NACD)
1
Near-field communication (NFC)
1
New employees
1
OCC
1
Offensive Cyber
1
Onboarding
1
Opiate use disorder
1
PSD2
1
Password security
1
Patient privacy
1
Personal data
4
Phishing
1
Physical security
1
Physicians
1
Population health
1
Precision farming
9
Privacy
1
Privacy Impact Assessments
1
Privacy legislation
2
Privacy technology
2
Private health insurance
1
Public-private sector cooperation
1
Puerto Rico
1
Radio-frequency identification (RFID)
1
Ransomware
1
Real Property
1
Recommended Practice for Nanoscale and Molecular Communication Framework
1
RegTech
1
Responsible Disclosure
1
Revised Payment Service Directive
1
Ridge, Thomas J.
1
Risk
1
Risk Assessment
1
Risk frameworks
1
Risk management
1
SD-WAN
1
SDN
1
SOC 2
1
SSAE 16
1
Security rating
1
Security ratings
1
Security risk vector
1
Self-Sovereign Identity
1
Shared responsibility model
1
Small and medium-sized enterprises (SMEs)
1
Small and midsize business (SMB)
1
Small businesses
1
Smart phones
1
Social Engineering
1
Software
1
Software Defined Networks
1
Software Defined WAN
2
Software as a Service (SaaS)
1
Spine
1
Substance abuse
2
Training
2
cyber-legibility primer
2
cybersecurity
2
data protection
×
Items
«
1
2
3
4
»
Items (1-20) out of 80 results
Sort by title (A-Z)
relevance
title (A-Z)
title (Z-A)
date (old to new)
date (new to old)
new to the BDR
20 per page
10
per page
20
per page
50
per page
100
per page
View
normal
gallery
A GDPR-Ready Cybersecurity and Privacy Plan for B2B SaaS Startups
Accurately Measuring your Organizations Defensive Posture Against Phishing Attacks
Adjuvant Security: A Cyber Legibility Primer
An Executive Cyber Education Framework for the Federal Bureau of Investigation
An In-House Counsel's Guide to Cybersecurity
Analyzing How An Accountable Care Organization Can Achieve Financial Sustainability Over A Five-Year Period By Applying the Triple Aim
Andrews Institiute Spine Integrated Practice Unit
Application and Integration of Cyber Operations to the Tactical Level of War
Appropriate Information Security Risk Management Practices for Today and the Future
Boards of Directors and Cybersecurity
Broadening the search to narrow the gap: The cybersecurity workforce challenge
Can We Trust Security Ratings? - Use and Credibility of Third-party Security Vendor Security Ratings
CCST Constraints: Addressing Programmatic Issues For Cyber Civil Support Teams
Children's Privacy
Coding for Privacy: An Agile Approach to Address Dynamic Privacy and Data Protection Requirements
Cyber Risk Scoring for Executives: An Assessment Framework
Cybersecurity Begins with ‘C-‘: Understanding and Managing Cyber Risk in the C-Suite
Cybersecurity is a Combat Sport: A Novel Approach
Cybersecurity Strategies and Policies in Managing 3rd Party Vendor Risks: A case for a quantitative Cybersecurity Scoring and Continuous Monitoring in the Financial Services industry
Data Governance and Cybersecurity Crossroads
«
1
2
3
4
»
Items (1-20) out of 80 results
×
Feedback
Loading...