Access "Publisher's Note: Compliance 2.0"
This article is part of the August 2005 issue of Betting the house on network anomaly detection systems
If you're like many security managers, you spend the bulk of your time peeing on the fire nearest your boot. Sorry to be so crass, but it's true: Security pros are legendary for fighting fires rather than looking for better ways to prevent them. Yes, getting strategic is tough. Rare is the opportunity to sit at the table where big picture business and IT decisions are made. Security was and is an afterthought at most organizations, and changing that dynamic ain't easy. The new regulatory environment can change all that. We're now entering "version 2.0" of compliance management, and security has a golden opportunity to gain a seat at the table. But it's up to you to make it happen. There are lots of new features in Compliance 2.0. Audits will be tougher. There will be less flexibility and patience with lack of progress or results. Real monetary penalties will be levied against real companies--maybe yours. Internally, Compliance 2.0 is all about continuous process improvement. Now that you have better insight into what the regs specify, you'll need to ... Access >>>
Premium Content for Free.
A Safe Bet?
Network anomaly detection is the newest player at the security table.
Whip your users into shape with security awareness training.
Paper or PKI?
SAFE is a biopharmaceutical industry initiative to standardize credentials for drug discovery. It could save the industry billions.
Learn how to leverage the VLAN as a security tool.
Recent Releases: Security product briefs, August 2005
Learn about the security products released in August 2005.
by Steven Weil, Contributor
Symark Software's PowerKeeper 1.4
- A Safe Bet?
Test labs are the ideal place to check theory against reality.
Hot Pick: Elemental's Elemental Compliance System 1.1
Elemental's Elemental Compliance System 1.1
Identity Management: Trustgenix's IdentityBridge Standard Edition
Trustgenix's IdentityBridge Standard Edition
Wireless security review: Juniper Networks' Netscreen-5GT Wireless
Juniper Networks' Netscreen-5GT Wireless
Hacking Exposed: Network Security Secrets & Solutions
Read a review of the security book Hacking Exposed: Network Security Secrets & Solutions (Fifth Edition).
- Proving Grounds
Ping: Chrisan Herrod
Perspectives: Which security certification best meets your needs?
The pressure is on to earn security certifications to prove your worth.
Publisher's Note: Compliance 2.0
Learn about Compliance 2.0, which involves continuous process improvement.
On The Radar: NIST resources
Help from the Government
- Ping: Chrisan Herrod
More Premium Content Accessible For Free
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...