Skip to page navigation menu
Skip entire header
Brown.edu
News
—
Events
—
Exhibits
—
For You
Undergraduate Students
Graduate & Medical Students
Faculty
Medical & Clinical Faculty
Alumni
Visiting Scholars
Special Collections Researchers
Library Staff
Brown Digital Repository
Off-Campus Access
My Library Account
Search
⚲
☰
×
BruKnow
Library Website
Search →
×
Feedback
Discover
Browse Collections
Deposited Content
Theses & Dissertations
Library Collections
Recently Added
About
I Want to
Upload Something
Assign a DOI
Consult on a Project
Use an API
Read FAQs
Search
Off-Campus Access
My Library Account
Borrow, Request, & Renew
Articles, Journals, & Databases
Research Help
Hours & Locations
Events
Ask a Question Now
Skip 13 subheader links
Home
Feedback
Discover ▾
Browse Collections
Deposited Content
Theses & Dissertations
Library Collections
Recently Added
About
I Want to ▾
Upload Something
Assign a DOI
Consult on a Project
Use an API
Read FAQs
Login
⚲
Top
Uploaded Content
Content added by scholars through self-service upload
Active filters
Keywords
Computer security
Cancel selected facet
Refine your results
Collection
25
Master of Science in Cybersecurity
25
School of Professional Studies
Format
25
text
Genre
25
Critical Challenge Project
Keywords
1
23 NYCYRR500
1
Adaptive governance
1
Agriculture technology
1
Agtech
1
Artifical Intelligence
Show More...
×
Close
Keywords
1
23 NYCYRR500
1
Adaptive governance
1
Agriculture technology
1
Agtech
1
Artifical Intelligence
1
Boards of Directors
2
Bug Bounty
1
Business Case Studies
1
Business Integrated Security Roles (BISRs)
1
COSO
1
Chief Executive Officer (CEO)
1
Compliance
25
Computer security
1
Corporate resiliency
2
Critical infrastructure
1
Cyber Civil Support Teams (CCST)
1
Cyber Education
1
Cyber Key Terrain
1
Cyber intelligence surveillance
1
Cyber security frameworks
1
CyberScore
2
Cybersecurity
1
Cybersecurity staffing
1
Cybersecurity standards
1
Cyberwarfare
1
Data classification
1
Data governance
1
Data inventory
1
Data map
1
Data profile
1
Data protection
1
Data scandal
1
Data steward
1
Deep learning
1
Employee Training
1
FFIEC
1
Federal Bureau of Investigation (FBI)
1
General Data Protection Regulation
3
General Data Protection Regulation (GDPR)
1
Hackers
1
Hacking
1
Hedge funds
1
ISO 27001/2
1
Information Security Awareness Training
1
Integrated risk management
1
Internet data
1
Internet of Battlefield Things (IoBT)
2
Internet of Things (IoT)
1
Internet privacy
1
Israel
1
Joint Intelligence Preparation of the Operational Environment
1
Machine learning
1
NIST 800-53
1
NIST Cybersecurity framework
1
National Association Corporate Directors (NACD)
1
OCC
1
Offensive Cyber
1
Personal data
1
Phishing
1
Physical security
1
Precision farming
5
Privacy
1
Privacy Impact Assessments
1
Privacy legislation
1
Privacy technology
1
Responsible Disclosure
1
Ridge, Thomas J.
1
Risk Assessment
1
Risk frameworks
1
Risk management
1
SOC 2
1
SSAE 16
1
Security rating
1
Security ratings
1
Security risk vector
1
Small and medium-sized enterprises (SMEs)
1
Small and midsize business (SMB)
1
Social Engineering
1
Software
2
Software as a Service (SaaS)
1
Tactical Cyber
1
Terms of service
1
Three Lines of Defense
1
Vendor Assessment
1
Vendor assessment
1
Vendor lifecycle
1
Vulnerability Disclosure
1
Workforce diversity
1
Wyden, Ron 1949-
1
agile
2
cybersecurity
1
data broker
1
data integrity
1
data privacy
1
data protection
1
data security
1
data trade
1
healthcare
1
information security
1
leadership
1
mHealth applications
1
mobile applications healthcare
1
mobile health
1
privacy law
1
secure scrum
×
Items
«
1
»
Items (1-25) out of 25 results
Sort by date (old to new)
relevance
title (A-Z)
title (Z-A)
date (old to new)
date (new to old)
new to the BDR
100 per page
10
per page
20
per page
50
per page
100
per page
View
normal
gallery
Cybersecurity Strategies and Policies in Managing 3rd Party Vendor Risks: A case for a quantitative Cybersecurity Scoring and Continuous Monitoring in the Financial Services industry
Encouraging Responsible Disclosure of Software Vulnerabilities
Making Do: Cybersecurity and Privacy Compliance for Small and Medium Businesses
Precision Agriculture and AgTech: An Industry Risk Assessment
Helping hedge funds address cybersecurity threats in a new regulatory environment.
A GDPR-Ready Cybersecurity and Privacy Plan for B2B SaaS Startups
Broadening the search to narrow the gap: The cybersecurity workforce challenge
Making Privacy Operational
Boards of Directors and Cybersecurity
CCST Constraints: Addressing Programmatic Issues For Cyber Civil Support Teams
IMPROVING CYBERSECURITY THROUGH EMPLOYEE TRAINING: A FRAMEWORK FOR SOCIAL ENGINEERING AWARENESS TRAINING BASED ON FIELD RESEARCH
Data Governance and Cybersecurity Crossroads
Privacy and Machine Learning in Physical Security
The Future of Risk - Creating a Framework for Growth of the Corporate Risk Function
Internet of Things...or Threats
Maximum Security - Minimum Staff: Integrating Security Into Your Business
Application and Integration of Cyber Operations to the Tactical Level of War
The Critical Elements of CEO Leadership That Will Improve Cybersecurity
Validating Privacy Requirements for the Personal Data Trade: Lessons from the Sarbanes-Oxley Act of 2002
Coding for Privacy: An Agile Approach to Address Dynamic Privacy and Data Protection Requirements
Security Considerations for Mobile Health Application Use
Privacy has a technology problem: Navigating the volatile privacy technology market
An Executive Cyber Education Framework for the Federal Bureau of Investigation
Privacy has a technology problem: Navigating the volatile privacy technology market
Can We Trust Security Ratings? - Use and Credibility of Third-party Security Vendor Security Ratings
«
1
»
Items (1-25) out of 25 results
×
Feedback
Loading...