IT Compliance Advisor:

April, 2009


April 27, 2009  5:45 PM

Kodak CISO on meeting today’s compliance challenges

GuyPardon Guy Pardon Profile: GuyPardon

In this IT Compliance Advisor podcast from SearchCompliance.com, associate editor Alexander B. Howard interviews Bruce Jones, chief information...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

April 24, 2009  7:58 PM

At RSA: Cyberwar, compliance, virtualization and cloud security

GuyPardon Guy Pardon Profile: GuyPardon

What's been the buzz at the RSA Conference? Constant and loud, to be sure, but perhaps a dull roar compared with past years. Seasoned analysts, vendors and delegates all note that attendance is down, no doubt due to a decrease in...


April 23, 2009  2:08 PM

IT spending, budget increases tied to compliance

Scot Petersen Scot Petersen Profile: Scot Petersen

The poor economy and recession has resulted in cutbacks just about everywhere, but apparently not in information security technology spending. That's not necessarily good news, though, for those...


April 22, 2009  9:56 PM

Cybersecurity is ‘a critical national interest,’ says Hathaway

GuyPardon Guy Pardon Profile: GuyPardon

"It is the fundamental responsibility of our government to secure cyberspace for its citizens and the world." -- Melissa Hathaway...


April 21, 2009  3:56 PM

The future of compliance policy management

Scot Petersen Scot Petersen Profile: Scot Petersen

Compliance is not just "one thing" for businesses anymore. Compliance has become a broad subject like "finance" or "security," with many sub-topics underneath that umbrella. The best strategy for the range of compliance policy management issues facing IT and business managers today is to take a...


April 21, 2009  2:42 PM

Database logging and privileged access control

SarahCortes Sarah Cortes Profile: SarahCortes

Ship captains have long started their days by initialing log entries. As a former senior security executive at a financial services firm with $500 billion in assets under management and over 20,000 employees, my day would start similarly. Each morning, I’d take responsibility for reviewing lists...


April 16, 2009  6:20 PM

Email to the Editor: 201 CMR 17.00, ID theft and data protection

GuyPardon Guy Pardon Profile: GuyPardon

Great article ["Panels describe risks of noncompliance with Mass. data protection law"]. Numerous thought-provoking statements in this article and in the legislation itself. My first thought is that...


April 13, 2009  7:08 PM

What does being PCI DSS compliant really mean?

Scot Petersen Scot Petersen Profile: Scot Petersen

There is a big difference between being PCI DSS compliant and being "certified" as PCI DSS compliant, says e-commerce expert Evan Schuman of

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 13, 2009  3:28 PM

Compliance fundamentals: Database logging, privileged access control

SarahCortes Sarah Cortes Profile: SarahCortes

On April 10, 2009, 10,868 Social Security numbers at Penn State Erie, The Behrend College, were compromised by a detected intrusion. Last October’s data breach of 17 million records at

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 9, 2009  4:00 PM

Keep your change management process simple

Scot Petersen Scot Petersen Profile: Scot Petersen

This is a guest post by Laurence Anker, engagement manager, technology risk management, at Jefferson Wells International Inc. The only constant in information technology today is change. The changes are broad and rapid across the domains of hardware, system software, application...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: