Tired of onerous compliance regulations? Try descoping

IT Security Audits

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Compliance and risk modeling

    You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting compliance as a necessary evil, but aggressively teaming with their internal compliance and audit teams to... 

  • Reviews of six top Web application firewalls

    In this month's issue of Information Security magazine, get 16 tips to help you navigate the changes to FRCP and avoid millions in fines. Read a case study about how one organization deployed full disk encryption on every machine, an increasingly pop... 

  • Certified Information Systems Auditor (CISA)

    The Certified Information Systems Auditor (CISA) is a certification issued by the Information Systems Audit and Control Association (ISACA). 

  • Qualified Security Assessor (QSA)

    A Qualified Security Assessor (QSA) is a person who has been certified by the PCI Security Standards Council to audit merchants for Payment Card Industry Data Security Standard (PCI DSS) compliance. 

  • RSA 2011 preview: Compliance

    In this RSA Conference 2011 preview video, SearchSecurity.com News Director Robert Westervelt moderates a discussion on a wide variety of compliance issues. Speakers include SearchSecurity.com Senior Site Editor Eric Parizo, and Research Director Jos... 

  • How to perform a third-party risk assessment for compliance

    Afraid of non-compliant business partners? Learn how to perform a third-party risk assessment to prevent non-compliance. 

  • PCI compliance requirement 11: Testing

    PCI Requirement 11 is a popular one, according to Diana Kelley. Learn why in this instructional video. 

  • Using IAM tools to improve compliance

    Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: They can help ease enterprise compliance woes. 

About IT Security Audits

Be prepared for your next IT security audit. Check out our resources on audit planning, tools, reports, mistakes, procedures, management standards, and how to work with auditors and audit validation.