Problem solve Get help with specific problems with your technologies, process and projects.

Richard Mackey: Building a framework-based compliance program

Richard Mackey talks about frameworks that can help you find the holes in your compliance program.

Watch more from our Security Video Library

Make sure to check out the rest of our interviews with security pros like Avi Rubin, Johannes Ullrich, Dan Kaminsky, and more. 
Behind every compliant organization is a thorough and thoughtful security process. Compliance pro Richard Mackey knows how to build a proper compliance program, from assembling requirements and capturing your current state to establishing realistic expectations and finally meeting the demands of regulations.

In this video, Mackey explains how to ensure discipline and begin an organizational commitment that allows a company to meet compliance standards continuously -- in both the short term and the long term.


This was last published in November 2008

Dig Deeper on IT security audits and audit frameworks

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close