Management, compliance & auditing September 1, 2020 Greg Belding Why your security risk management program should include legacy systems The aim of business is to be profitable — and as we all know, investing in new systems, devices, and technology costs money that may otherwise be logged...
Management, compliance & auditing August 13, 2020 Greg Belding Top 6 cybersecurity books for IT auditors Like many other information security professionals, you probably have a library of books on the topic of your career choice. Not only that, but like many others,...
Management, compliance & auditing July 20, 2020 Dimitar Kostadinov Key elements of an information security policy An information security policy is a set of rules enacted by an organization to ensure that all users of networks or the IT structure within the organization’s...
Management, compliance & auditing May 20, 2020 Susan Morrow Critical security concerns for the financial services industry The financial services industry is heavily regulated with compliance requirements focusing on the management of risk and fraud. The sector must comply with...
Management, compliance & auditing May 19, 2020 Susan Morrow Critical security concerns facing government If the government enforces regulations, then its various departments and functions must also comply with those same regulations. Major data security regulations...
Management, compliance & auditing May 12, 2020 Karen Walsh Security first: Compliance by design Whether it’s the General Data Protection Regulation (GDPR) or the New York Stop Hacks and Improve Electronic Data Security Act (NY SHIELD), nearly every...
Management, compliance & auditing February 10, 2020 Karen Walsh What companies need to know about proposed changes to the Gramm-Leach-Bliley Act Also called the Financial Modernization Act of 1999, GLBA governs the way in which financial institutions must prevent the disclosure of consumer nonpublic...
Management, compliance & auditing December 10, 2019 Shubham Vashist Secure process audit A secure process audit is a type of security audit in which the tester (auditor) tests the application or server or any network device where he or she captures...
Management, compliance & auditing September 7, 2019 Tom Olzak Chapter 6 – End-user device security [updated 2019] This is Chapter 6 in Tom Olzak's book, "Enterprise Security: A practitioner’s guide." Chapter 5 is available here: VLAN Network Segmentation and Security-...
Management, compliance & auditing September 3, 2019 Dan Virgillito Acceptable Use Policy (AUP) template for public WiFi networks [Updated 2019] Acceptable Use Policies (AUPs) are an essential component to all organizations, companies, and other establishments offering Internet or Intranet access. According...