Information Security provides challenge for Corporate Risk Managers

Baker, Carol
March 2005
Credit Control;2005, Vol. 26 Issue 3, p6
Trade Publication
The article focuses on issues related to information security management. The recent raft of corporate governance legislation, emanating in the U.S. and making progress in the European Union, has transformed the security and business landscape. The regulatory environment doesn't simply demand that executives tighten up controls, instead it requires a whole new level of transparency into data, processes, and accountability. For instance, the U.S. Sarbanes-Oxley Act requires management to know who is accessing their systems.


Related Articles

  • The Weakest Link. Scanlon, Bill // Interactive Week;7/16/2001, Vol. 8 Issue 28, p26 

    Discusses how companies can prevent computer security breaches caused by employees. Employees' action that have caused company losses due to security breaches; Features of Certicom's Movian encryption software; Information on biometrics approach to managing access to company's information.

  • Cybercrime comes to Washington. Paller, Alan // Government Executive;Sep98, Vol. 30 Issue 9, p59 

    Focuses on the danger posed by cybercrime to federal agencies in the United States. Case of a hacking incident at the Web page of the US Department of Justice; Estimates of the US Department of Defense on attacks to their computers; Four-step plan in protecting information. INSETS: Secure...

  • Security policy in a box. Andress, Mandy // InfoWorld;10/22/2001, Vol. 23 Issue 43, p54 

    Evaluates the PoliVec Builder 1.0, an application that creates custom security policies for information systems. Market price; How to build effective security policy with PoliVec; Features of PoliVec.

  • Standard Of Good Practice.  // Database & Network Journal;Dec2003, Vol. 33 Issue 6, p22 

    Reports on the release of the "Standard of Good Practice for Information Security," by the Information Security Forum (ISF). Limits on the risks associated with information systems; Range of topics in information technology; Areas of the ISF Standard of Good Practice.

  • EU to collect traveller data from next month.  // Business Travel World;May2004, p6 

    Reports on the plan of the European Union to start collecting personal data on travellers entering the union's member states starting June 2004. Data that will be collected; Condition of the Advanced Passenger Information System between Europe and the U.S.; Criticisms against the proposed scheme.

  • Events and courses.  // SC Magazine: For IT Security Professionals (UK Edition);Nov2004, p73 

    This section provides information on events and courses for the information systems security industry in 2004 and 2005. The unique, regional networking event, Infosecurity Manchester, will be presented by the organisers of Infosecurity Europe. This one-day roadshow will provide attendees with...

  • Funding approval.  // SC Magazine: For IT Security Professionals (UK Edition);Sep/Oct2013, p6 

    The article offers strategies to ensure funding support for security programmes including the use of good communication, defining the programme's return-on-investment (ROI) for the company, and extending ownership of information security to the entire organization.

  • DEVELOPING A COMPUTER SECURITY POLICY FOR ORGANIZATIONAL USE AND IMPLEMENTATION. Forcht, Karen A.; Ayers, Walter Cary // Journal of Computer Information Systems;Winter2000/2001, Vol. 41 Issue 2, p52 

    Discusses a study which examined the factors that should be considered in developing a computer security policy for organizational use and implementation. Legal capability of a security policy; Format structure of the policy; Scope of the policy; Corporate requirements; Importance of an...

  • Google caves in to EC demands.  // Precision Marketing;6/15/2007, Vol. 19 Issue 15, p3 

    The article reports on the issues concerning Google Inc.'s unfulfilled requirements needed for data security in Great Britain. The report noted that the company has bowed to pressure over how long it keeps customer data by agreeing to slash the time it stores information. Google was pressured by...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics