Premium Content

Access "Compliance and risk modeling"

Issue Overview

Information Security magazine - May 2013 / Volume 15 / No. 4

You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting compliance as a necessary evil, but aggressively teaming with their internal compliance and audit teams to structure security programs both for heightened security and clear compliance deliverables. The cover story tackles not only this shift in emphasis, but also the latest updates in key compliance frameworks, offering guidance on how to position new requirements as an opportunity rather than more paperwork.   Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Continuous monitoring program demystified
    ism_1014.png
    E-Zine

    For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...

  • Does Windows 8.1 meet the demands of the BYOD age?
    windows_shopping_8-1.png
    E-Handbook

    The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...

  • Application security policy after Heartbleed
    ISM_0914.png
    E-Zine

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...