The GRC Challenge - Slide 15

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20
Next The GRC Challenge-15 Next

About half are generally centralized.

When it comes to anything related to governance, risk management and compliance (GRC), there’s always room for a lot of grousing. The two main issues, of course, are securing the cooperation of the parties involved and the reliance on a lot of manual processes to get the job done.

A survey of 191 GRC practitioners, conducted by the Ponemon Institute on behalf of the RSA unit of EMC, finds that a lack of resources and a lack of cooperation are the two biggest GRC impediments. But perhaps even more troubling is what appears to be a lack of faith in the IT tools available to help automate the process.

Of course, the one thing that everybody can seem to agree on is that the Payment Card Industry Data Security Standard (PCI DSS) is far and away the most difficult standard with which to comply. Whether that is a good or bad thing will naturally depend on your perspective.

More Slideshows:

Security Vulnerabilities at All-time Highs for Mobile Devices Mobile security recommendations for consumers and administrators.

Salary Negotiations: Insider Secrets Recruiter reveals insider's secrets to getting paid what you want.

Q1 Threat Report: Surge in Malware, Drop in Spam With six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.