Access "Compliance Guide for Managers"
This article is part of the March 2006 issue of Captive to SOX compliance? A compliance guide for managers
How to influence the C-suite, save your company money, please auditors and secure your data. Become Compliant (without breaking the bank) Re-use your existing tools to meet Regulatory demands. Case Study #1 Sun Shines on SB 1386 Sun's Dennedy tackles SB 1386 compliance by making it part of the corporate culture. Case Study #2 SureWest Makes the Call on SOX Compliance SureWest's Dotson meets SOX compliance with tightened password controls. Case Study #3 Insuring Compliance: Nationwide Tackles GLBA Data-flow analysis was Nationwide's biggest task for GLBA compliance, Herath says. Case Study #4 Lake Forest Hospital's Rx for Compliance Lake Forest Hospital's Morenzoni: Merging networks helped with HIPAA compliance. Plus: How compliance is spurring spending; tips for building frameworks Become Compliant (without breaking the bank) It's a floor wax! It's a dessert topping! It's a compliance tool! Vendors have tried to cash in on the compliance crush by promising a cure-all to regulation woes. But by now, savvy IT professionals know there's no magic compliance tool... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Compliance Guide for Managers
SPECIAL How to influence the C-suite, save your company money, please auditors and secure your data.
-
Recent Releases: Security product briefs, March 2006
Read about the security products that launched in March 2006.
-
Portable device security: Centennial Software's DeviceWall 3.1
Read a security product review of Centennial Software's DeviceWall 3.1.
-
Secure from the Start
SOFTWARE DEVELOPMENT Get off on the right foot by working with your developers to ingrain security in the coding process.
-
Integrated Security
Symantec's Gateway Security 5600 series
-
Compliance Guide for Managers
-
-
Recent Releases: Security product briefs, March 2006
Read about the security products that launched in March 2006.
-
Hot Pick: NFR Security's Sentivist 5.0
NFR Security's Sentivist 5.0
-
Google Hacking: Why being a Google dork is hurting your company
Are you a Google dork? A simple Google search engine query can expose corporate security secrets and private information. Black hats are aware of it. Are you? Learn how to prevent and defend against Google hacking.
-
Unplugged
PRODUCT REVIEW Even if you don't have an unauthorized WLAN, you need protection.
-
Recent Releases: Security product briefs, March 2006
-
Columns
-
Editor's Desk: The case for application-layer security
C++ - Security = 0
-
Layer 8: Military, defense sectors offer little security leadership
Military Madness
-
Prespectives
No Guarantee
-
Ping: William Pelgrin
William Pelgrin
-
Editor's Desk: The case for application-layer security
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO