Access "Editor's Desk: Risk is the new black"
This article is part of the December 2007/January 2008 issue of Reflections on the impact of Sarbanes-Oxley
Information Security celebrates its 10th anniversary with a new theory on risk management for the next decade. Cramming 10 years of information security into 64 pages this month required a mighty big shoehorn, not to mention months of planning, hundreds of hours of research, interviewing and reporting on the happenings of the last decade in order to justly commemorate this publication's 10th anniversary. It was a blast putting this issue together because it gave all of us a chance to reconnect, or connect for the first time in some instances, with the pillars of this industry. We're fortunate to have access to these people that many in our readership don't enjoy, and it's our job to foster those relationships and share their insight, advice and leadership with you. So in homage to that spirit, I bring you a new direction and some food for thought as we begin the next 10 years of our existence. At our Information Security Decisions conference in November, one of our Security 7 award winners, Tim McKnight, suggested we might change the name of the show to ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Blow Out the Candles
Information Security magazine turns 10 years old, maturing right alongside the security industry.
-
Milestones
Getting the Point | Turning Points | Nefarious Numbers | SOX Appeal | Evolution of a Hacker | Digital Pickpockets | The Toughest Battle: 10 Years, 10 Attacks | We Hardly Knew Ye
-
Reflections
A Dynamic Decade | News of the Day | Trustworthy Finally? | Crystal Ball
-
Blow Out the Candles
-
Columns
-
Ping: Fyodor
Fyodor
-
Editor's Desk: Risk is the new black
A New Direction for Risk?
-
Ping: Fyodor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO