Making the Case for Network Security Compliance

Compliance - network security or for anything else - is critical to a company. This excellent presentation explains the challenge and presented a solution.

The focus is on network security - perhaps because it is sponsored by Cisco? - but the content is an excellent read for compliance in general.

Download (please login and scroll down)

Download Document: Documents are in common file formats such as Microsoft Word (doc), Powerpoint (ppt), Excel (xls,csv,xlsx), and Adobe pdf.
Download


Related Categories




Related Topics



Related Articles


A Guide to IT Security Governance

This paper highlights the critical role of security governance. It answers key questions about governing IT Security in your enterprise. Very Good Read!

Audit Like a Hacker

This presentation guides you through a security audit from a different perspective - that of a hacker who focuses on "value" among other things.

Identity Lifecycle Management

This presentation discusses the security challenges facing an enterprise, the cost of breaches, the need for and cost of compliance and then proposes using identity lifecycle management as a solution to address these challenges.

Improving Information Security Compliance

This paper presents a process-oriented approach to manage organizational change needed to improve information security compliance. The approach uses Business Aligned Information Security  anagement (BAISeM) and principles that have been derived from...

Information Security Governance

This presentation provides information security governance guidance for information security managers.

Information Security Governance Assessment Tool

 This paper presents an information security governance assessment tool based upon the information security governance (ISG) framework recommended by the Corporate Governance Task Force.

ITIL V3 and Information Security

This paper discusses the role and importance of effective Information Security Management (ISM), how it is supported by an extensive family of global standards and the way these harmonize with ITIL

Key Compliance Requirements

This whitepaper discusses the requirements for compliance, and their implications for actions that an organization must take to avoid legal, and regulatory jeopardy. The paper presents these imperatives in the context of the key laws, and regulations...

Performing an Information Security Assessment

This presentation describes the steps in performing an information security assessment - what are the critical security goals and objectives? what are the documentation requirements? how to incorporate regulatory requirements? how to gather data to ...

Primer on Compliance

This white paper provides an introduction to compliance - what is compliance? why is compliance important? how to implement compliance in your organization? A good place for the CIO to start their journey into compliance and get ready to move beyond ...

What is Information Security Governance?

 This presentation provides a definition for information security governance and how to implement it in your organization.

Why Information Security Governance?

 This presentation discusses the business need for information security governance.


Posted on 05/22/2009 by


Making the Case for Network Security Compliance author sourabhhajela

sourabhhajela

Signup For ThoughtLeader









Subscribe


CIO Index

Our Focus is On Your Agenda

CIO Index is the world's largest professional network for CIOs - of the CIO, for the CIO, by the CIO. 

Over 70,000 CIOs and other IT Executives use CIO Index to Learn, Network and Share.

 

Cioindex, Inc.

  • (+1) 800-309-3550
  • Mon - Fri 9:00am - 5:00 pm
  • 115 Franklin Tpke, Mahwah, NJ 07430