Access "People"
This article is part of the December 2007/January 2008 issue of Reflections on the impact of Sarbanes-Oxley
Impact Sarbanes-Oxley empowered information security professionals with the clout they'd sought for so long. Paul Sarbanes and Michael Oxley Like a petulant child at Thanksgiving clamoring for a seat at the lavish candlelit table alongside the adults, information security managers suffered from board envy. How could they get the attention of corporate directors, those who mattered most in companies across America? How could they justify the urgency of their constant clamoring? How could they impress that security was more than a cost center with little tangible return? Nothing had worked through 2001, not even the horrible terrorist attacks of Sept. 11, 2001, which did more for redundant data centers and business continuity than it did to spark what many believed would be a revolutionary interest in information security. Nothing worked. Nothing until accounting scandals tore down energy giant Enron, at the time the seventh largest company in the country, and WorldCom, one of the largest telcos in the world. The respective fraud took down not only these ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Blow Out the Candles
Information Security magazine turns 10 years old, maturing right alongside the security industry.
-
Milestones
Getting the Point | Turning Points | Nefarious Numbers | SOX Appeal | Evolution of a Hacker | Digital Pickpockets | The Toughest Battle: 10 Years, 10 Attacks | We Hardly Knew Ye
-
Reflections
A Dynamic Decade | News of the Day | Trustworthy Finally? | Crystal Ball
-
Blow Out the Candles
-
Columns
-
Ping: Fyodor
Fyodor
-
Editor's Desk: Risk is the new black
A New Direction for Risk?
-
Ping: Fyodor
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO