Information security compliance

You may need to do a quick third-party registration to access certain ones. Resources without a hyperlink are no longer published/posted.

Articles
  • Understanding the Cybersecurity Maturity Model Certification (CMMC)
  • PCI DSS compliance across retail and financial services
  • Considerations for addressing the new PCI SSL/TLS requirements
  • Going beyond addressable with HIPAA and doing what’s right with data encryption
  • How security intelligence can support HIPAA compliance
  • Why PHI access controls matter
  • What Changed in the New PCI DSS 3.2?
  • The HIPAA compliance payoffs of protecting PHI with encryption
  • Dealing with vendors who want to push their SOC audit reports on you
  • Keeping your Web applications in check with HIPAA compliance
  • Mobile app security risks could cost you millions
  • Waiting until the last minute to implement long-term security measures
  • Core reasons why information security programs fail
  • How to stick to your IT security plan
  • It takes more than resolve to manage an effective security program
  • What are the most important security testing basics?
  • Determining your scope of security testing
  • Why ALL of your Web applications need security testing
  • It can be dangerous assuming a vulnerability is not a vulnerability
  • What constitutes a “critical” security flaw?
  • Rely on data center audits alone and you’ll get hit eventually
  • What SOC reports won’t tell you – and what you need to do about it
  • Six areas of importance in the PCI Penetration Testing Guidance
  • Niche security flaws should NOT be your focus
  • Why regulating information security professionals is a bad thing
  • How do you know when a security vulnerability matters to your business?
  • The root of many security problems
  • When your lawyer becomes your CISO
  • The compliance crutch holding up Corporate America
  • The fallacy of information security awareness and training
  • The funny thing about “confidential” information
  • Why starting from scratch with security is delusional
  • How Your Web Presence is Throwing You Out Of Compliance
  • The information security basics your organization should already know
  • Regulatory compliance requirements for security solutions providers
  • Keeping resilient
  • Extending HIPAA Compliance from Electronic Health Records to Document and Data Transmissions
  • Lessons learned from a web security breach
  • Application security calls for a proactive approach
  • Understanding the value of the OWASP Top 10 2013
  • Don’t forget enterprise password protection in a merger or acquisition
  • What can Developers do to Better Protect PII?
  • Considering a career in compliance? Heed these warnings first
  • Audits, maintenance crucial to business continuity policy success
  • Control, visibility essential to records management and compliance
  • Beware the perils of organization-wide compliance policy involvement
  • The sometimes-harsh realities of information security and compliance
  • Security considerations around enterprise content management
  • Five corporate compliance program traits you need to prevent breaches
  • Microsoft Security Compliance Manager enhances desktop security
  • Compliance is just the beginning
  • New and not-so-new security twists in the Cybersecurity Act of 2012
  • Our dangerous overdependence on IT auditing
  • Compliance considerations when disposing old equipment
  • How Windows Server 8 can help with compliance
  • There’s more to web security than meets the eye
  • The importance of incident response plans in disaster recovery
  • Regulatory compliance requirements for security solutions providers
  • Top compliance questions you need to be asking your network administrators
  • Address information risk management now — before the going gets tough
  • How can you avoid a Web security breach? It’s all in the preparation.
  • Seven dangerous assumptions about compliance
  • A thorough data retention strategy needs more than just IT oversight
  • Top 5 techniques for management buy-in for your IT governance strategy
  • Data security and backup encryption remain critical
  • Secure data storage strategies and budget-friendly security tools for SMBs
  • Improving Web security by working with what you’ve got
  • Why people violate security policies
  • Preparing for an incident at the workstation level
  • It’s time we shift our thinking about endpoint protection
  • Act now to prevent smartphone security risks at your organization
  • Compliance officers’ next big headache: Securing mobile applications
  • Using Windows 7 management tools to your advantage
  • Getting to know Security Compliance Manager
  • Information security’s tie-in with the e-discovery process
  • Lax enterprise mobile device management hampers e-discovery
  • Managing information risk inherent to an effective compliance strategy
  • Avoid duplicated efforts to cut the cost of regulatory compliance
  • The long-term consequences of not addressing compliance today
  • Fix Your Low-Hanging Fruit or Forever Hold Your Peace
  • How to write an effective data retention policy for Exchange
  • Solidify Your Exchange Server Incident Response Plan
  • But Compliance is Someone Else’s Job!
  • Cybersecurity and Internet Freedom Act – New name, same game
  • 9 good reasons not to buy information security products
  • Security best practices without question?
  • How’s your security culture?
  • Notable changes in the PCI DSS 2.0 affecting Web application security
  • Is the latest cybersecurity bill an Internet takeover by the fed?
  • The cloud’s compliance complexities you cannot ignore
  • Top questions that must be answered before taking on the cloud
  • Don’t lose sight of what’s important
  • What is computer forensics technology? Does it help compliance?
  • Leaning on records management can take the angst out of e-discovery
  • Priorities for your sound regulatory compliance management policy
  • Put compliance management back into server virtualization
  • Achieving compliance is about more than secure data encryption
  • What compliance professionals shouldn’t do after data breaches
  • Can mobile device security include risk management and compliance?
  • Using metrics to enhance information risk management
  • Why the Cybersecurity Act is better for government than business
  • Why do so many people buy into “checklist” audits?
  • Data Protection and Compliance in Complex Environments
  • Enterprise iPads: Compliance risk or productivity tool?
  • Data Protection and Compliance in Complex Environments
  • Meet compliance requirements with improved database security practices
  • The Dangers of Over Reliance on Compliance
  • Find unexpected vulnerabilities to ensure cloud compliance
  • Getting your arms around the compliance beast
  • The lowdown on PCI compliance
  • HIPAA-covered entities, business associates confront HITECH Act rules
  • Security and compliance can go together, when done in the right order
  • Data retention policies and procedures for SMBs
  • Is all the PCI DSS compliance whining and complaining justified?
  • Why it may not be ideal for your lawyer to be your compliance officer
  • The fine line between not encrypting your databases and breach notification
  • The realities of PCI DSS 6.6 application code reviews
  • Gain Control with Compliance Tools
  • Safe and secure Windows logging practices
  • Meet compliance with improved database security practices
  • Compliance on a budget – 10 easy steps
  • Will the ‘regulatory police’ be knocking on your door?
  • Getting your regulatory priorities in order
  • Keeping SOX 404 under control(s)
  • Key points of Sarbanes-Oxley
  • The USA PATRIOT Act: Increasing the size of government
  • Instilling a HIPAA Mindset
  • HIPAA Compliance Doesn’t Come in a Box
Whitepapers
Podcasts
  • The future of compliance policy management
Webcasts
  • Sensible HIPAA Security Compliance for Business Associates & Subcontractors
  • Ensuring PCI DSS Compliance in the Cloud
  • Managing network security threats with an ERM strategy
  • Why you need to create an ESI strategy – ESI, or Electronically Stored Information, strategies have become mandatory over the past few years. This webcast focuses on how to approach the requirements ESI is designed to facilitate including e-discovery of documents for legal cases. It will also address how to organize and establish ownership of data groups, how to create a system that accesses knowledge efficiently, and how to maintain the system so it stays in compliance with various regulations.
  • How to manage the ongoing information security requirements for SOX, HIPAA, GLBA and other key regulations – a single solution – Many business leaders and IT managers believe they are in compliance with all the federal and state information security regulations affecting them. That may be true but at what cost to the organization? Being compliant in a defensive context and proactively managing compliance as an ongoing business process are very different from each other. Unfortunately, more organizations do more of the former and aren’t sure how to do the latter. In this paid webcast hosted by ComplianceOnline, you’ll learn that reducing the costs of information security compliance requires everyone speaking a common language within the organization, utilizing the proper tools, and managing information security at a high enough level to reasonably satisfy all the regulations at once.

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: