Premium Content

Access "Cybersecurity: Global risk management moves beyond regulations"

Kathleen Richards, Features Editor Published: 29 Aug 2013

Regulatory environments and compliance drive global risk management and associated actions at many organizations. But auditing is not based on actual threats. As threat intelligence becomes more available and this information is offered up by multiple sources, is it changing the way that global enterprises view risk assessment? "The ability to access intelligence and react to complex attacks is vital," said MacDonnell Ulsch, CEO and chief analyst at ZeroPoint Risk Research, LLC, a Boston-based consultancy focused on global risk management and related services. "If a regulation states that a risk assessment must be conducted, what does that really mean? "Regulations don't instruct, so it is important to understand what to look for," said Ulsch, who likens global threat intelligence to a cat setting out birdseed. "After a time, the birds feel it's safe to eat there."  Consumed by compliance Security professionals have warned companies for years that compliance-driven security programs may not adequately address security concerns. "It is very rare that you will... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Firewalls play by new rules by David Strom, Contributor

      Modern firewalls offer greater application awareness and user controls. Protect your migration strategy with these tips from the pros.

    • Bridging the IT security skills gap by Robert Lemos

      While poaching security talent may plug short-term gaps, outreach and education will solve the long-term shortfall in IT security professionals.

More Premium Content Accessible For Free

  • Application security policy after Heartbleed
    ISM_0914.png
    E-Zine

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...

  • Devising a security strategy for the modern network
    countering_cybercrime.png
    E-Handbook

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...

  • The big data challenge: What's in store for NoSQL security
    security_0814.jpg
    E-Zine

    In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...