PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2007

CISO priorities focused on compliance over security

Sarbanes-Oxley, SB 1386, HIPAA: These regulations are now part of the security vernacular. But has compliance truly helped our security posture? It's a double-edged sword. The CEO now knows what you do for a living, or at least has an inkling. You've been invited to meetings from which you were previously excluded, chatted with executives you had never met, maybe even been thrust from the confines of middle management to a permanent seat at the executive table. What's more, the regulations have justified increased budgets and technology build-outs that may have never been approved four years ago. But the distraction of SOX and the like has actually made your company less secure. You've spent millions of dollars to comply, put in place appropriate access controls and clearly segregated duties. You've made the auditors happy or at the very least, gotten them off your back. But you haven't protected your "secret sauce." The engineering schematics, manufacturing processes and other trade secrets that keep you ahead of the ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product review: Six removable device control security products

    Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.

  • Prioritizing compliance and information security

    Have compliance demands refocused and weakened information security efforts?

Columns in this issue