Hi All, *Description:- * * * *1- I need information regarding the IDENTITY MANAGEMENT in information security as applied in Enterprise level.* * * * How the modules in identity management looks appear in real time(Enterprise level).* * * * How the polices and procedures will be applied and what type of regulatory standards to be followed.* * * *I need the information regarding this identity management.* * * *2- In Auditing there are two types:Internal and External.* * * *As a Information system auditor, how the auditing going to happen in both internal and external in-terms of systems(Enterprise level).* * * *How the polices, standards procedures will be applied in auditing.* * * * * *Regards* *Harish .M* * * * *
-- You received this message because you are subscribed to the Google Groups "NForceIT" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send an email to [email protected]. For more options, visit https://groups.google.com/groups/opt_out.
