Cyber Chief Magazine: Top trends shaping management priorities in 2020 Download Now
16 January, 2019 | Brian Johnson

Top 3 Audit Challenges and How to Overcome Them

No matter what role you play in the audit process, the experience can be painful. If you’re an external consultant, you have to work with clients who have limited budgets and high expectations. And if you’re an internal IT/security auditor, you might have to wade through a sea of internal...
14 June, 2018 | Matt Middleton-Leal

GDPR Confusion: 7 Common Myths Busted

The day before the deadline for GDPR compliance, I received emails from 8 different companies asking for my consent for them to collect data about me. But I can’t even remember how I got on these vendors’ mailing lists, and I haven’t received any other communication from them lately....
24 March, 2015 | Deb Shinder

Data Governance: The Key to Compliance

In a legislation-laden era, more and more organizations are falling under the mandates of governmental or industry regulation. The requirements can be complex and confusing, and it’s hard to know where to start in creating and enforcing policies that will keep your company in compliance, so many...
17 October, 2014 | Jeff Melnick

How to Detect User Account Changes in Active Directory

Tracking user account changes in Active Directory is primarily important from compliance and security-related considerations and also for operational efficiency purposes. Inactive user accounts or a large number of new accounts with extended permissions, disabled or suspiciously modified user...
7 November, 2013 | Nick Cavalancia

Death by Event Log Overload

When it comes to security, event logs are supposed to be the best friends of an IT guy managing the environment, right? Roger Grimes from InfoWorld claims that the evidence of malicious activity can be found in Event Logs. So, if companies today already have all necessary data that points...
7 February, 2012 | Chris Rich

IT Survival 101: How to get approval for your auditing project

Many of you may understand the importance of auditing changes in your environment. Perhaps some of you have been thinking about how to justify IT projects to satisfy your IT audit checklist. You know the face of IT as we know it is changing rapidly. Now more than any other time since the dawn of...
14 October, 2011 | Chris Rich

Why failing an audit is a good thing: Thoughts from the field

Recently I posted an article in the Security Group on Spiceworks from Network World on the benefits of failing an IT audit. I also posed the question to this group, “Would you rather fail an audit to uncover weaknesses, or rely on other means?” The responses were intriguing. Most agreed in...
28 September, 2010 | Stephen Schimmel

10 Risky Types of Change

Change is inherent to the growth of any successful organization. Adaptation to organizational changes is a necessary reality, and without it, organizations couldn’t keep up with the changing times, demographics, workflows and business. That is why changes in IT infrastructure are a necessary...
25 July, 2010 | Stephen Schimmel

Challenges of SOX Compliance For IT Systems

SOX compliance for IT systems has become an increasingly important issue for organizations of all kinds. Intended to assign a quantifiable level of accountability to organizations and the IT controls that impact financial reporting operations, the act includes two sections that affect IT...