Security Process improvement:

Process improvement


Browse SubCategories:

Change control:

1 - 1 of 1

Data security:

1 - 2 of 2
  • Elements of a data protection strategy

    Book Excerpt -  In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy.

  • Secure data transmission methods

    Tip -  The main purpose of this tip is to explore secure data transmission options that are available to help meet regulatory and legal requirements.

ID and access management:

1 - 1 of 1
  • Defining adequate security controls

    Tip -  Because of the changing nature of technology, the language in the Sarbanes-Oxley Act is purposefully vague. This article explores the meaning of adequate security controls and what is required for SOX compliance.

IT governance:

1 - 1 of 1
  • Strategic IT planning for compliance and beyond

    Tip -  Regulatory compliance places demands on corporate businesses, but regulations like HIPAA, GLBA and SOX also provide an opportunity for strategic IT planning across the entire business. This article tells you how.

Provisioning:

1 - 1 of 1
  • Reborn identity

    Information Security maga -  GM's Jarrod Jasper drives a common user profile across all systems.