Email Alerts
-
Checklist: 11 things to do after a hack
Your network's been cracked, what do you do next? Contributor Jonathan Hassell recommends following these eleven steps to limit damage and preserve evidence. Tip
-
Separating fact from fiction: Security technologies for regulatory compliance
This presentation by Burton Group analyst Diana Kelley explores what companies need to think about when creating policies for compliance. Tip
-
The 5 pillars of successful compliance
Find out how to put the key benefits of what Pamela Fusco achieved at Merck & Co. to work in your own organization as she covers five key areas associated with security's role in compliance. Tip
-
What to tell senior management about regulatory compliance
The IT Governance Institute offers actionable advice for implementing security governance as it relates to regulatory compliance. Tip
-
Complying with multiple regulations and contending with conflicts
This tip reviews how to comply with multiple regulations and what to do when they conflict. Tip
-
Does your organization need a CCO?
Find out how tackling compliance -- particularly when regulations share common goals -- can be made easier by charging a corporate compliance officer (CCO) with oversight responsibility. Tip
-
Meeting the PCI Data Security Standard requirements mitigates threats
Learn how how using five security best practices gets you closer to compliance with the PCI Data Security Standard and helps mitigate common threats to e-business. Tip
-
Getting your regulatory priorities in order
Learn five key elements to help you avoid trouble, expend the least amount of effort and ensure your priorities are on target and in order for your regulatory compliance projects. Tip
-
How to stop hacker theft: Employee awareness, risk assessment policies
In the first of a six-part primer on thinking like a hacker, security managers are encouraged to examine publicly available information and discarded data. Tip
-
This year compliance, next year control
Paul discusses the age of corporate governance, how companies move from formalizing their security compliance programs to selecting appropriate controls to protect against risks. Tip
Security Management Strategies for the CIO