Access your Pro+ Content below.
Demystifying governance, risk and compliance
This article is part of the June 2010 issue of Information Security magazine
Due to the stunning increase in the amount of regulatory and industry requirements over the past decade, a methodology commonly referred to as governance, risk and compliance (GRC) emerged. The most basic definition of the GRC methodology is that it harmonizes efforts across previously detached disciplines that existed in their own silos within an organization. Historically, compliance was a function of audit, risk management -- if it was performed at all-- was a function of management, and governance generally didn't exist as a discipline outside of Wall Street and the banking industry until Sarbanes-Oxley (SOX) made it a requirement for publicly traded companies. However, with the emergence of the Payment Card Industry Data Security Standard, the maturation of SOX and the increased scrutiny being brought to bear by industry-specific regulations such as Gramm-Leach Bliley (GLBA) and the Health Insurance Portability and Accountability Act (HIPAA), it's become impossible for organizations to avoid addressing each of these ...
Access this Pro+ Content for Free!
Features in this issue
Cloud computing alters enterprise risk. Here's what you need to know in order to safely navigate the cloud.
Symantec acquisitions of PGP and Guardian Edge future ensures that encryption is becoming less of a standalone security tool.
Learn about the options for protecting laptop data, including full disk encryption and file/folder encryption, and their associated deployment and management challenges.
GRC aims to bring together disparate compliance efforts in the enterprise, but the concept has been stymied by a lack of clarity. Developing a GRC program requires three key steps.
Columns in this issue
Organizations who stay silent after a data security breach end up paying a higher price and helping cybercriminals.
Bruce Schneier and Marcus Ranum debate the risks associated with hiring hackers.
If you're spending more to protect custodial data because of compliance than you are to protect company secrets, you're missing the big picture.