Email Alerts
-
FISMA Compliance and the Evolution to Continuous Monitoring
The U.S. Department of State developed a system for improving federal cybersecurity. Feature
-
PING with Jane Scott Norris
In an interview with Information Security magazine, Jane Scott Norris, Department of State's first CISO, offers some insight on what it takes to become a CISO. Information Security maga
-
Making sense of the maze
The program director of regulatory compliance for the Object Management Group discusses a new project known as Compliance Global Regulatory Information Database, which should help businesses manage regulatory compliance demands across international b... Executive Briefing
-
Best practices in Internet security: The Access Certificates for Electronic Services Program
The Access Certificates for Electronic Services Program (ACES) brings multiple PKI service providers together into an interoperable public key infrastructure (PKI) for use by government entitites and the private sector. Feature
-
Ensure that legal responsibilities are clear -- Especially when trouble strikes
Excerpt from Chapter 15 of Information Nation Warrior: Information Management Compliance Boot Camp. Book Chapter
-
Robby Ann Hamlin
Information Security maga
-
ID theft and national security
Check out what some ITKnowledge Exchange members had to say about this controversial issue. Security Speak-Out
-
Do you speak geek: Respecting the letter of the law
Test your knowledge of security laws and regulations. Quiz
-
Quiz: Compliance
Test your knowledge of legislation and standards. Quiz
Security Management Strategies for the CIO