This article can also be found in the Premium Editorial Download "Information Security magazine: Keeping on top of risk management and data integrity essentials."
Download it now to read this article plus other related content.
Our survey finds that enterprises are spending big on management systems to meet regulatory requirements.
Requires Free Membership to View
| Top Security Priorities | ||||||
|
|
||||||
Big Brother is not only watching your security; he is driving the adoption of key technologies that help bring order to the chaos of compliance and management.
"Even though it's a hassle keeping up with the regulations, it's really wonderful because I haven't seen a regulation that asked us to do something that we didn't have to do already," says Wayne Proctor, CISO at Certegy. "What's being asked for are things that I've always wanted to get in the program."
SOX, GLBA, HIPAA, SB 1386, Basel II and scores more regulations have become integral parts of the security lexicon. Since the inception of SOX, enterprises have been racing to beef up their security to improve corporate governance, ensure the integrity of data and prevent breaches that could result in huge fines and, worst-case scenario, jail time.
This was first published in April 2005
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation