Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

More from SearchSecurity -- July 2005

Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.

Meet the New Champions
by Mike Mimoso
This month's issue showed you how Cigna, a large health insurance company, is giving business managers a vested interest in advocating for sound security practices. SearchSecurity.com has important tips on how your company and make business units accountable for security. See why sometimes, all it takes is a simple document to hold management responsible for security and risk. >> CLICK TO READ THE TIP
>> The VP and CISO at Prudential Financial told attendees at Information Security Decisions how to decentralize security responsibility. CLICK TO SEE THE PRESENTATION

>> Read the 20 computer security facts that everyone should know and share with their staff. CLICK TO READ THE FACT SHEET

Call for Nominations!

Information Security magazine and SearchSecurity.com will honor innovative security practitioners in seven vertical markets this fall.  Winners will also be profiled in an Information Security magazine feature article. Awards will be handed out in October at the Information Security Decisions conference. Nominate yourself or a colleague by downloading the nomination form and e-mailing it to
securityseven@infosecuritymag.com by Aug. 1.
Closing the Policy Gap
Everyone agrees that good security policies must be easily understood, implemented and enforced. The following resources will complement the tips found in Information Security magazine for closing the policy gap on a user and management level. This checklist helps you determine whether your security policy is on target.

>> Get advice on how to write policies for easier implementation and higher compliance. View policy guru Charles Cresson Wood's presentation from Information Security Decisions. CLICK TO VIEW THE PRESENTATION.

>> Read how to tailor your security policies to comply with SOX 404. CLICK TO READ THE TIP

Beyond Antispyware
Take your battle against spyware to the browser by attending a webcast with Windows hardening expert Jonathan Hassell. He shares tactics for locking down Internet Explorer against browser-based malware.

PING with Karen Worstell
by Amber Plante
The Microsoft CISO discusses how she keeps Redmond and its products secure.

Passwords are dead -- What's next?
Enterprises have a lot of authentication options these days. But how reliable many of them are is the source of much debate. First, learn how to prevent authentication bypass attacks by reading this valuable tip.
>> Explore the future of ID management and authentication. Is two-factor authentication failing? See why Bruce Schneier thinks so and then add your two cents. CLICK TO READ THE ARTICLE

>> See why it may be too soon to sound the death knell for passwords. CLICK TO READ THE ARTICLE

Go to school for FREE

Go to Web Security School where you'll learn how to harden a Web server and apply countermeasures to prevent hackers from breaking into a network. Study at your own pace and learn how to implement security policies and test a Web site's security, as well as how to handle a breach should the unspeakable happen. This course consists of an entrance exam, three lessons and a final exam. You'll also find handy checklists that you can download and use on the job. All of these resources are available on-demand so you can learn at your convenience. Through our agreement with (ISC)², all CISSP and SSCP participants who attend the school webcasts can earn one CPE credit.
June 2005
May 2005
April 2005
This was last published in June 2005

Dig Deeper on Information security program management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.