Access "Editor's Desk: Security 7 Winners Chronicle Trends That Shape The Industry"
This article is part of the October 2009 issue of Winners of Information Security magazine's Security 7 Award
This is the fifth year we've handed out the Security 7 Award, a milestone for sure. We've recognized some of the best minds in the security industry, be they pioneers such as Dorothy Denning or Gene Spafford, or folks such as Michael Daly, Stephen Bonner or Richard Jackson who don't have the same name recognition, but were held in such high regard by colleagues and contemporaries that they were nominated for our annual award and put on equal footing. And while ultimately the award is for the people being recognized, it's really about the work they do and how they're adjusting to threats, managing risk and fitting in with the business. Looking back at the accomplishments of all the nominees from the past five years, it's a tidy, packaged look at how the security industry has matured. Some of the early winners were just starting to talk about the need to keep personally identifiable information safe and dabbling with bits and pieces of identity management, such as provisioning systems. Slowly, the conversations turned toward risk management, and the ... Access >>>
Premium Content for Free.
Melissa Hathaway: Government Must Keep Pace with Cybersecurity Threats
by Melissa Hathaway, Contributor
Securing the Internet means to much to the future of the U.S. economy and national security.
Bernie Rominski: Communicate Effectively with Management about Risk
by Bernie Rominski
Learn how to communicate with senior management about risk; it's your job.
Information Security magazine 2009 Security 7 Award winners
Information Security magazine annouces the winners of its fifth annual Security 7 Awards.
Jerry Freese: Make Critical Infrastructure Protection a Priority
by Jerry Freese
Critical infrastructure protection must be addressed today to protect our country tomorrow.
Adrian Perrig: Improve SSL/TLS Security Through Education and Technology
by Adrian Perrig
Carnegie Mellon University's CyLab designs security to improve all aspects of society.
- Melissa Hathaway: Government Must Keep Pace with Cybersecurity Threats by Melissa Hathaway, Contributor
Bruce Jones: Report Security and Risk Metrics in a Business-Friendly Way
by Bruce Jones
Security metrics must, not only provide a view of security posture, but must support security budgeting and investment processes.
Tony Spinelli: Prioritize Information Security over Compliance
by Tony Spinelli
Organizations need to prioritize security over compliance to ensure comprehensive risk mitigation.
SOX compliance burdens midmarket security teams
Smaller public companies bear significantly higher pain in terms of revenue and costs per employee complying with Sarbanes-Oxley.
Developers Need Help with Security Errors
SQL injection attacks continue to plague Web applications. Companies need to invest in technology and education to hold off hackers.
Jon Moore: Build a Security Control Framework for Predictable Compliance
by Jon Moore
Health care provider Humana Inc., has developed a security controls framework that addresses all of the industry and federal regulations it must comply with.
- Bruce Jones: Report Security and Risk Metrics in a Business-Friendly Way by Bruce Jones
Editor's Desk: Security 7 Winners Chronicle Trends That Shape The Industry
Looking back at five years of award winners provides a timeline of security trends that you need to absorb.
How to avoid Internet liability lawsuits
by Jeanne Debus
Enterprises face numerous potential liabilities online. Avoiding lawsuits requires a sound cyber risk management plan.
- Editor's Desk: Security 7 Winners Chronicle Trends That Shape The Industry
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...