Access "Compliance Guide for Managers"
This article is part of the March 2006 issue of Captive to SOX compliance? A compliance guide for managers
How to influence the C-suite, save your company money, please auditors and secure your data. Become Compliant (without breaking the bank) Re-use your existing tools to meet Regulatory demands. Case Study #1 Sun Shines on SB 1386 Sun's Dennedy tackles SB 1386 compliance by making it part of the corporate culture. Case Study #2 SureWest Makes the Call on SOX Compliance SureWest's Dotson meets SOX compliance with tightened password controls. Case Study #3 Insuring Compliance: Nationwide Tackles GLBA Data-flow analysis was Nationwide's biggest task for GLBA compliance, Herath says. Case Study #4 Lake Forest Hospital's Rx for Compliance Lake Forest Hospital's Morenzoni: Merging networks helped with HIPAA compliance. Plus: How compliance is spurring spending; tips for building frameworks Become Compliant (without breaking the bank) It's a floor wax! It's a dessert topping! It's a compliance tool! Vendors have tried to cash in on the compliance crush by promising a cure-all to regulation woes. But by now, savvy IT professionals know there's no magic compliance tool... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Compliance Guide for Managers
SPECIAL How to influence the C-suite, save your company money, please auditors and secure your data.
-
Recent Releases: Security product briefs, March 2006
Read about the security products that launched in March 2006.
-
Portable device security: Centennial Software's DeviceWall 3.1
Read a security product review of Centennial Software's DeviceWall 3.1.
-
Secure from the Start
SOFTWARE DEVELOPMENT Get off on the right foot by working with your developers to ingrain security in the coding process.
-
Integrated Security
Symantec's Gateway Security 5600 series
-
Compliance Guide for Managers
-
-
Recent Releases: Security product briefs, March 2006
Read about the security products that launched in March 2006.
-
Hot Pick: NFR Security's Sentivist 5.0
NFR Security's Sentivist 5.0
-
Google Hacking: Why being a Google dork is hurting your company
Are you a Google dork? A simple Google search engine query can expose corporate security secrets and private information. Black hats are aware of it. Are you? Learn how to prevent and defend against Google hacking.
-
Unplugged
PRODUCT REVIEW Even if you don't have an unauthorized WLAN, you need protection.
-
Recent Releases: Security product briefs, March 2006
-
Columns
-
Editor's Desk: The case for application-layer security
C++ - Security = 0
-
Layer 8: Military, defense sectors offer little security leadership
Military Madness
-
Prespectives
No Guarantee
-
Ping: William Pelgrin
William Pelgrin
-
Editor's Desk: The case for application-layer security
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO