Again, the content won't change. We'll still provide the same insight and technical knowledge on information security we have for the past 10 years. Our same writers, technical editors, security practitioners and columnists will produce feature stories and analysis aimed at meeting your ever-changing and growing need for information on security technologies and best practices.
We invite you to read the ezine online, download it and read it later, or even print out all or part of it so you can read it anywhere at your convenience.
And watch your inbox for the February issue where we'll offer tips on how to protect your organization during a recession and unveil our exclusive Priorities 2009 survey results!
Here's a sneak peek at our January issue:
In this Special Issue of Information Security, we explore the importance and effectiveness of security steering committees and how these groups help integrate information security into the business.TABLE OF CONTENTS
The Company You Keep
Cover Story We examine what it takes to build a security steering committee inside your organization, security's role in forming the committee, goals for the committee, who should be invited to the table and what bumps in the road you can expect.
Not So Different
Given today's regulatory environment, internal auditors have to be at the top of your guest list. In this article, you'll hear from internal auditors and learn that while audit and security may often be at odds, their goals aren't all that different.
Once distant corporate acquaintances, human resources and security have been forced to work closely in investigations, policy development and even disaster recovery planning. Learn from HR professionals about their ties to security and how to facilitate a better relationship.
Also in this issue, you'll read about other security steering committee members, including finance and IT, and we also examine how tightly security is integrated into the business for midmarket companies.
Our regular sections are still there for you. You get the usual selections of columns, news analysis and our regular Face-Off debate between experts Marcus Ranum and Bruce Schneier. This month, they examine the effectiveness of the many state data breach notification acts.
In addition to the January issue, you can now access all Information Security magazine archives and the related content on SearchSecurity.com. Please note, you may be prompted to log in to SearchSecurity.com to view the archives.
Please let us know what you think of the new digital version of Information Security. Send us a note at firstname.lastname@example.org.