Email Alerts
-
Using the Microsoft Sysinternals suite for a computer systems audit
If you're an auditor, or are looking to perform an internal audit, Microsoft's suite of Sysinternals tools could greatly help you. Learn how to use these free tools in this video demo. Tip
-
HIPAA covered entity and business associate agreement requirements
Under HITECH, both "covered entities" and "business associates" must comply with HIPAA data protection mandates, but, as a covered entity, what's the best way both to maintain compliance for your organization, and make sure all your BAs are compliant... Tip
-
How to perform an Active Directory security audit
As a security professional, you depend on Active Directory to provision users, but how secure is your implementation of AD itself? Learn how to perform an Active Directory security audit in this expert tip. Tip
-
Compliance strategy: How to become an internal IT auditor
The word "auditor" can make many information security pros cringe. But in this tip, learn how to become an internal IT auditor to help advance your enterprise's regulatory compliance programs. Tip
-
A guide to internal and external network security auditing
Contributor Stephen Cobb reviews the baseline network audit processes that a security professional should absolutely conduct regularly. Tip
-
HIPAA compliance: New regulations change the game
Recent changes to HIPAA regulations coupled with renewed HIPAA enforcement may stir a panic among enterprise security teams charged with safeguarding PHI. Not so, according to security management expert David Mortman. Learn how HIPAA has changed and ... Tip
-
Maltego demo: Identifying a website's trust relationships
This month, Peter Giannoulis of TheAcademyPro.com and TheAcademyHome.com demonstrates Maltego, an information-gathering tool that infosec pros can use to assist with vulnerability assessments and penetration tests by identifying trust relationships o... Tip
-
Strategies for email archiving and meeting compliance regulations
According to a recent study, 29% of surveyed IT professionals archive their email for compliance reasons. Michael Cobb reviews compliance regulations that demand email archiving and how such products can ease some of the pain that comes with the proc... Tip
-
Security and audit relationships: Uneasy antagonists or partners in arms?
The relationship between information security pros and auditors can be a rocky one, but there are a few specific steps that can make it smoother. Tony Higgins explains the best ways to keep auditors happy, and make the compliance job easier. Tip
-
Richard Mackey: Building a framework-based compliance program
Richard Mackey talks about frameworks that can help you find the holes in your compliance program. Tip
Security Management Strategies for the CIO