Email Alerts
-
ISO 17799: A methodical approach to partner and service provider security management
Outsourcing may relieve some of a company's burdens, but handing off business functions doesn't necessarily mean less work for security teams when sensitive information or critical infrastructure hang in the balance. In this tip, Richard Mackey expla... Tip
-
Mapping the path toward information security program maturity
Amid tight information security budgets, it can be hard to recommend the best ways to invest new dollars or focus new resources. In this tip, Ed Moyle explains why creating a security program maturity map is a sensible way to not only track a program... Tip
-
Step 7: The changing nature of compliance
Compliance School
-
Step 4: Detailed objectives and policies
Compliance School
-
Step 3: Establishing an IT Control Framework
Compliance School
-
Step 1: Understanding compliance -- Financial and technical standards
Compliance School
-
Step 5: Measuring compliance
Compliance School
-
Step 6: Managing and tracking compliance
Compliance School
-
Introduction to COBIT for SOX compliance
The Sarbanes-Oxley Act does not detail compliance requirements for IT, so many enterprises and auditors have adopted the standard COBIT, introduced here. Book Chapter
-
How BS7799 and COBIT differ, part two
This Ask the Expert Q&A, examines the origins of the ISO/IEC 17799 and COBIT security management standard, and discusses the differences between them. Windows IT management tip
Security Management Strategies for the CIO