Information Security Leader, Author, Instructor and Speaker

Default utility Image

Building an IT Compliance Program in Five Steps TAGS: Let’s face it: compliance is boring.  It’s tough to face the sea of acronyms: PCI DSS, SOX, HIPAA, GLBA, FERPA, …Continue reading →

Default utility Image

Data Center Virtualization and Compliance TAGS: | Many enterprises are transitioning their data centers to virtual environments, but doing so may have unintended consequences when it comes …Continue reading →

Default utility Image

Visa’s PCI compliance policy change: The end of the PCI assessment? TAGS: | Not long ago, Visa Inc. changed its policy on complianceassessments for the Payment Card Industry Data Security Standard (PCI DSS). More specifically, Visa decided that …Continue reading →

Default utility Image

JOBS Act and SOX Compliance TAGS: | In early April, President Barack Obama signed the Jumpstart Our Business Startups (JOBS) Act, a bipartisan bill meant to create …Continue reading →

Default utility Image

Building an Information and IT Compliance Program TAGS: In higher education, we’ve seen an unprecedented increase in laws and regulations that govern everything from the way we handle …Continue reading →

Default utility Image

HIPAA compliance: How to prepare for upcoming KPMG HIPAA audits TAGS: | | The auditors are coming. The U.S. Department of Health and Human Services (HHS) recently awarded KPMG, one of the Big …Continue reading →

Default utility Image

HIPAA compliance: How to prepare for upcoming KPMG HIPAA audits TAGS: | The auditors are coming. The U.S. Department of Health and Human Services (HHS) recently awarded KPMG, one of the Big …Continue reading →

Default utility Image

Four Steps to PCI DSS Compliance TAGS: | If you work in a small or medium-sized business, you might have opened your mail recently and found a letter …Continue reading →

Default utility Image

A Cheat Sheet on Security Monitoring in the Enterprise TAGS: | Let’s face facts. Monitoring is one of the most boring tasks facing IT professionals, and security monitoring is about the …Continue reading →

Default utility Image

5 Insider Tips: Using IT Audits to Maximize Security TAGS: | Organizations like yours are under tremendous pressure to meet compliance directives from a growing number of regulatory and industry mandates, …Continue reading →