Big Business Compliance and Controls Reports released today…
It seems that these past few days everyone is releasing a study or report surrounding business compliance and controls. Each has very valuable information and is definitely worth the download and read....
View ArticleGlobal Impact of Corporate Espionage – a focus on China and U.S. Companies
An eye opening report was put forth by the U.S. government (USCC) that focused on the political impact of China on the United States. The report covered currency, pollution, censorship, information...
View ArticleFraud and SAS 99
There are three conditions (that are in line with the ACFE Fraud Triangle) that are present where fraud exists – incentives, opportunities, and rationalizations. These breakdown as: Incentives –...
View ArticleNews Beat: Technology Integration on the radar
A quick news bite on a topic I similarly covered at the PCI DSS focused site was posted at Bank Systems and Technology. Highlights the importance and challenge faced by organizations when they conduct...
View ArticleBest E-Discovery Tools, Providers, and Trends
The annual 2007 Socha-Gelbmann Electronic Discovery Survey has been released and is a great resource for vetting your current internal approach to managing data, and providing a quick guide for...
View ArticleCIA: Energy Infrastructure Attacked
In my book, IT Compliance and Controls, I highlight the importance of the energy infrastructure, and the risks that these systems face given their newly interconnectedness. To highlight the relevant...
View ArticleSensitive Information includes Internet Addresses, EU Data Privacy Group
Personally Identifiable Information is defined differently by each industry, country, and region. Companies must have information intelligence practices in place that account for these types of...
View ArticleSettled Identity Theft Complaints with the FTC
A constant challenge for organizations is measuring the potential impact and consequences of mandated regulations. The weighting of compliance initiatives based on such consequences is not best...
View ArticleWeak Principle Controls are Cause of Security Breaches
Remediation and corrective action are part of the lessons learned when a negative event (security breach, fraud, etc…) occurs within an organization. It is regarded as best practice to learn from...
View ArticleHow to meet the intent of Regulations in a Virtualized world…
Today I had an interesting question posted to me… Are we doing the right thing with regards to our virtualization environment and our business mandates? This sparked several hours of discussion, but a...
View Article
More Pages to Explore .....