Items Tagged with "Compliance"


Bd86d2b4bd72ac0ca847696eec3759f3

Compliance Combines with Vulnerability Scanning to Create Aegify

December 10, 2012 Added by:Michelle Drolet

Two security firms, the established Rapid7 vulnerability manager and eGestalt, a cloud-based compliance management provider, have signed an OEM deal that will do something for the IT security industry that hasn’t been done before: a combination security and compliance posture management...

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

Five Essentials of a Chief Compliance Officer Position

December 05, 2012 Added by:Thomas Fox

The five essential features are based on the Department of Justice’s thinking on the issue in the form of the US Sentencing Guidelines, FCPA enforcement actions and evolving best practices. If your company is not following these it may well not be deemed to have a commitment to compliance...

Comments  (0)

145dfdfe39f987b240313956a81652d1

Pen Test vs. Vulnerability Scan: You know the difference, but do they?

November 28, 2012 Added by:Stacey Holleran

Small business owners often don't have someone who is versed in network security. So when they are told they need a “network penetration test” to comply with PCI DSS, many will contact the growing number of companies offering inexpensive testing services...

Comments  (5)

59d9b46aa00c70238bb89056cfeb96c0

Beacon Events Compliance Conference in Beijing – I Wish I Could Be There

November 27, 2012 Added by:Thomas Fox

If you have not had the opportunity to attend a compliance-related conference tailored to the challenges of working in the Far East this would be the one for you. Even if you have attended such an event, this conference focuses on China and will give you insight into how to do business...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Buzzword Compliance Not Enough: Must Haves for Meaningful Use

November 08, 2012 Added by:Danny Lieberman

Many technology vendors tout the idea of self management, and the advantages of mobile healthcare apps, virtual visits, tablets and e-detailing but in fact, a face-to-face relationship with a doctor is more powerful than a digital relationship alone. We don’t need Sherry Turkle to tell us that...

Comments  (0)

5029f8f9d65d988cb378fc0290f86cc4

From Trick or Treat through Thanksgiving: Examining the Past to Prepare for the Future

November 04, 2012 Added by:Mary Shaddock Jones

In my experience, companies need to be closely reviewing what little case law or factual allegations exist with regard to the FCPA so that they too know where to find any potential problems that may exist within their own company. There are only so many ways to hide the dollar...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Creation, Implementation and Administration of a Hotline

October 29, 2012 Added by:Thomas Fox

I recently saw a White Paper released through Compliance Week, where an un-named author posited that there are seven essential features to create an effective hotline. I found this article to be useful for a compliance practitioner to quickly review how his or her company might set up a hotline...

Comments  (0)

0356a83ecb15c8e33b00560d7bebe47f

Using ISO 27005: Where Does a Risk Taxonomy Fit?

October 23, 2012 Added by:Stephen Marchewitz

Whether you start from top-down management or are looking for bottom-up results, having a quantifiable approach to security risk management that aligns with a known standard such as ISO will put you in a better position than you are today...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

James Bond at 50 – A Compliance Conversation in English and American

October 15, 2012 Added by:Thomas Fox

Maybe it’s just the difference in the two cultures; in the UK, they are trying figure out how and why compliance failures occurred and change the compliance culture so they can obey the law. In the US, businesses want to change the law so the conduct companies engage in will no longer violate the law...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Auditing Healthcare IT Security with Multiple Threat Scenarios

October 10, 2012 Added by:Danny Lieberman

For small to mid-size hospitals, nursing homes, medical device, healthcare IT vendors will have a much simpler audit and will be primarily interested in how cheaply the audit can be done and how much they can save using the technique of multiple threat analysis...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

CEO Hubris and Compliance Catastrophes

October 08, 2012 Added by:Thomas Fox

Even in this age of documenting, checking, measuring, stress testing and reassessing every conceivable type of risk, what is the one which is never tested? She believes that the answer is “the chief executive gets so high on power that he or she losses the plot...”

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Security: Tips for Using Personal Devices at Work

October 08, 2012 Added by:Robert Siciliano

If you as an employee of a hospital use your personal device at work and also use it outside of work and it gets lost or stolen, then YES, you and the hospital would be in a great deal of hot water in the event that mobile device was lost...

Comments  (18)

Bd07d58f0d31d48d3764821d109bf165

Revenge of the NERCs?

October 04, 2012 Added by:Tripwire Inc

Ultimately this is critical stuff. If we don’t want to find ourselves wandering the wastelands searching for food and water fighting off marauding bands of marauders (is that redundant?) its important for these ninjas to get it right and keep the pirates at bay...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Navigating Social Media Legal Risks: Safeguarding Your Business

October 03, 2012 Added by:Ben Rothke

Social media makes it easy for organizations to find and retain customers and increase sales, amongst many other benefits. At the same time, it can expose an organization to significant and highly-expensive legal risks and issues, and find themselves at the receiving end of a subpoena...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Revising Your Code of Conduct: Don’t Wait

September 30, 2012 Added by:Thomas Fox

The backbone of the revision process is how your company captures, collaborates and preserves “all of the comments, notes, edits and decisions during the entire project," and you should assess “the best application to launch your Code and whether it includes a certification process..."

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

CFAA Does Not Bar Misappropriation when Employee Authorized

September 27, 2012 Added by:David Navetta

The CFAA only permits claims for accessing a protected computer “without authorization” and “exceeds authorized access” “only when an individual accesses a computer without permission or obtains or alters information on a computer beyond that which he is authorized to access...”

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »