Inside the Briefcase

As the Network Changes, Engineers Are Embracing the DevOps Model

As the Network Changes, Engineers Are Embracing the DevOps Model

Businesses that have embraced digital transformation with a clear...

The 5 Most Common Application Bottlenecks

The 5 Most Common Application Bottlenecks

Application bottlenecks can lead an otherwise functional computer or...

How Machine Learning Helps Improve the Security Industry

How Machine Learning Helps Improve the Security Industry

We’ve been moving more and more towards computerized processes...

Transformation on a Global Scale

Transformation on a Global Scale

Necessity may be the mother of invention, but it’s...

IT Briefcase Exclusive Interview: As Container Adoption Swells, So Do Security Concerns

IT Briefcase Exclusive Interview: As Container Adoption Swells, So Do Security Concerns

Fei Huang, NeuVector
In this Fresh Ink interview segment,...

The Growing Demand for IT Security Auditing

March 30, 2011 No Comments

Risk = Threats × Vulnerabilities × Impact

Security officers, risk management professionals and auditors must rely on the effectiveness of IT security. Security-related controls form a large part of the general controls structure, enabling organizations to rely on automated controls in applications such as financial reporting systems. Moreover, IT auditors and compliance professionals are often responsible for performing security audits in order to identify policy and regulatory compliance issues (e.g., Sarbanes-Oxley, Basel II Accord) and unacceptable risks.

This white paper describes the drivers for better IT security auditing, the problems with current approaches and how to automate IT security audits.

Download White Paper

Featured White Papers, SECURITY

Leave a Reply

(required)

(required)


ADVERTISEMENT

UC Expo

SSOW

sptechcon

ITBriefcase Comparison Report