PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Information security blueprint for architecture and systems

This article is part of the Information Security magazine issue of February 2007
A formalized architecture diagrams how To handle the changing threat and regulatory environments. Every so often, something beastly crosses the desk of an enterprise security manager. Be it a digital disaster or a new regulatory mandate, these nasties have transformed a CISO's professional existence into a series of policy and process adjustments, and reallocations of resources. Any measure of standardization and repeatability becomes a welcome ally in warding off the effects of a shift in the threat or regulatory environment. Jim Brockett takes heed, but isn't fazed, by the sophistication of new phishing schemes or insider threats. Shifts in the landscape mean the senior vice president and CIO of Washington Trust Bank, a $3.5 billion regional commercial bank in the Pacific Northwest, reaches for the virtual blueprints of his security architecture. These steps are the foundation of his enterprise's security program, the pillars upon which customer and proprietary data is kept safe and auditors and the board of directors are ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Unified threat management: Fortinet's FortiGate 3600A
Fortinet's FortiGate 3600A
-
Security system products latest releases: Archsight, Finjan, Sophos
Get information, such as price, features, protection and support, on the most recently released versions of security products, such as Archsight logger and Sophos Security Suite.
-
Vulnerability scanning review: PatchLink's PatchLink Update 6.3
PatchLink's PatchLink Update 6.3
-
New tools target ISPs to stop botnets
Security vendors are bringing the botnet fight to ISPs and carriers.
-
Intrusion Prevention: Juniper Networks' ISG 2000 with IDP
Juniper Networks' ISG 2000 with IDP
-
Information security blueprint for architecture and systems
A formalized security architecture diagrams how you should handle the changing threat and regulatory environments.
-
HIPAA privacy records and guidelines: How to achieve compliance
Learn how to achieve compliance with HIPAA certification and learn to avoid and fix risks with password security, privacy regulations, records, guidelines.
-
At Your Service: February 2007 managed security services news
-
-
Going Global
Organizations sending data abroad must be prepared to comply with a slew of privacy and security regulations.
Columns in this issue
-
Ping: Josh Seeger
Josh Seeger
-
Layer8: Is risk management for real?
Fad or For Real?
-
Editor's Desk: Can someone call an exterminator?
A Bug's Life