Seven Recommendations for a New Era of Compliance - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Seven Recommendations for a New Era of Compliance-4 Next

Determining the “right” level of security controls to meet compliance requirements and business objectives is complex. Ultimately it is a judgment call that considers security and legal risks. A critical aspect of these decisions is asking what would be deemed commercially “reasonable and appropriate.”

As complying with regulations continues to get more complex, IT organizations need to take a more proactive approach to managing compliance. What follows are seven recommendations for managing compliance that have been compiled by the Security for Business Innovation Council, a group of senior IT executives brought together by RSA, a division of EMC, to create ongoing reports on the state of security in the enterprise.

More Slideshows:


12 Top Productivity Apps for Your BlackBerry Top business productivity apps from BlackBerry AppWorld.

12 Hot New Tablets Hitting the Market The market is expanding at a brisk pace with many new competitive tablets being introduced to the public.


10 Top Security Policies from the Knowledge Network Prevent security breaches with a solid security plan.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.