Information security compliance

You may need to do a quick third-party registration to access certain ones.

Articles
  • Understanding the Cybersecurity Maturity Model Certification (CMMC)
  • PCI DSS compliance across retail and financial services
  • Considerations for addressing the new PCI SSL/TLS requirements (formerly published at it.toolbox.com)
  • Going beyond addressable with HIPAA and doing what’s right with data encryption (formerly published at thalessecurity.com)
  • How security intelligence can support HIPAA compliance (formerly published at thalessecurity.com)
  • Why PHI access controls matter (formerly published at thalessecurity.com)
  • What Changed in the New PCI DSS 3.2?
  • The HIPAA compliance payoffs of protecting PHI with encryption (formerly published at thalessecurity.com)
  • Dealing with vendors who want to push their SOC audit reports on you (formerly published at it.toolbox.com)
  • Keeping your Web applications in check with HIPAA compliance (formerly published at it.toolbox.com)
  • Mobile app security risks could cost you millions
  • Waiting until the last minute to implement long-term security measures
  • Core reasons why information security programs fail (formerly published at algosec.com)
  • How to stick to your IT security plan (formerly published at techtarget.com)
  • It takes more than resolve to manage an effective security program
  • What are the most important security testing basics? (formerly published at techtarget.com)
  • Determining your scope of security testing
  • Why ALL of your Web applications need security testing
  • It can be dangerous assuming a vulnerability is not a vulnerability
  • What constitutes a “critical” security flaw?
  • Rely on data center audits alone and you’ll get hit eventually
  • What SOC reports won’t tell you – and what you need to do about it (formerly published at algosec.com)
  • Six areas of importance in the PCI Penetration Testing Guidance (formerly published at techtarget.com)
  • Niche security flaws should NOT be your focus (formerly published at it.toolbox.com)
  • Why regulating information security professionals is a bad thing (formerly published at it.toolbox.com)
  • How do you know when a security vulnerability matters to your business? (formerly published at it.toolbox.com)
  • The root of many security problems (formerly published at techtarget.com)
  • When your lawyer becomes your CISO (formerly published at it.toolbox.com)
  • The compliance crutch holding up Corporate America (formerly published at it.toolbox.com)
  • The fallacy of information security awareness and training (formerly published at it.toolbox.com)
  • The funny thing about “confidential” information (formerly published at it.toolbox.com)
  • Why starting from scratch with security is delusional
  • How Your Web Presence is Throwing You Out Of Compliance (formerly published at techtarget.com)
  • The information security basics your organization should already know (formerly published at techtarget.com)
  • Regulatory compliance requirements for security solutions providers (formerly published at techtarget.com)
  • Keeping resilient
  • Extending HIPAA Compliance from Electronic Health Records to Document and Data Transmissions (formerly published at itmangement.com)
  • Lessons learned from a web security breach
  • Application security calls for a proactive approach
  • Understanding the value of the OWASP Top 10 2013
  • Don’t forget enterprise password protection in a merger or acquisition (formerly published at techtarget.com)
  • What can Developers do to Better Protect PII?
  • Considering a career in compliance? Heed these warnings first (formerly published at techtarget.com)
  • Audits, maintenance crucial to business continuity policy success (formerly published at techtarget.com )
  • Control, visibility essential to records management and compliance (formerly published at techtarget.com)
  • Beware the perils of organization-wide compliance policy involvement (formerly published at techtarget.com )
  • The sometimes-harsh realities of information security and compliance (formerly published at techtarget.com)
  • Security considerations around enterprise content management (formerly published at techtarget.com)
  • Five corporate compliance program traits you need to prevent breaches (formerly published at techtarget.com)
  • Microsoft Security Compliance Manager enhances desktop security (formerly published at techtarget.com)
  • Compliance is just the beginning
  • New and not-so-new security twists in the Cybersecurity Act of 2012 (formerly published at techtarget.com)
  • Our dangerous overdependence on IT auditing (formerly published at techtarget.com)
  • Compliance considerations when disposing old equipment (formerly published at techtarget.com)
  • How Windows Server 8 can help with compliance (formerly published at techtarget.com)
  • There’s more to web security than meets the eye
  • The importance of incident response plans in disaster recovery (formerly published at techtarget.com)
  • Regulatory compliance requirements for security solutions providers (formerly published at techtarget.com)
  • Top compliance questions you need to be asking your network administrators (formerly published at techtarget.com)
  • Address information risk management now — before the going gets tough
  • How can you avoid a Web security breach? It’s all in the preparation. (formerly published at techtarget.com)
  • Seven dangerous assumptions about compliance (formerly published at techtarget.com)
  • A thorough data retention strategy needs more than just IT oversight (formerly published at techtarget.com)
  • Top 5 techniques for management buy-in for your IT governance strategy (formerly published at techtarget.com)
  • Data security and backup encryption remain critical (formerly published at techtarget.com)
  • Secure data storage strategies and budget-friendly security tools for SMBs (formerly published at techtarget.com)
  • Improving Web security by working with what you’ve got
  • Why people violate security policies
  • Preparing for an incident at the workstation level (formerly published at techtarget.com)
  • It’s time we shift our thinking about endpoint protection (formerly published at techtarget.com)
  • Act now to prevent smartphone security risks at your organization (formerly published at securityintelligence.com )
  • Compliance officers’ next big headache: Securing mobile applications (formerly published at techtarget.com )
  • Using Windows 7 management tools to your advantage (formerly published at techtarget.com)
  • Getting to know Security Compliance Manager (formerly published at techtarget.com)
  • Information security’s tie-in with the e-discovery process (formerly published at techtarget.com)
  • Lax enterprise mobile device management hampers e-discovery (formerly published at techtarget.com)
  • Managing information risk inherent to an effective compliance strategy (formerly published at techtarget.com)
  • Avoid duplicated efforts to cut the cost of regulatory compliance (formerly published at techtarget.com)
  • The long-term consequences of not addressing compliance today (formerly published at techtarget.com)
  • Fix Your Low-Hanging Fruit or Forever Hold Your Peace
  • How to write an effective data retention policy for Exchange (formerly published at techtarget.com)
  • Solidify Your Exchange Server Incident Response Plan (formerly published at techtarget.com)
  • But Compliance is Someone Else’s Job!
  • Cybersecurity and Internet Freedom Act – New name, same game (formerly published at techtarget.com)
  • 9 good reasons not to buy information security products
  • Security best practices without question?
  • How’s your security culture?
  • Notable changes in the PCI DSS 2.0 affecting Web application security
  • Is the latest cybersecurity bill an Internet takeover by the fed? (formerly published at techtarget.com)
  • The cloud’s compliance complexities you cannot ignore (formerly published at techtarget.com)
  • Top questions that must be answered before taking on the cloud (formerly published at techtarget.com)
  • Don’t lose sight of what’s important
  • What is computer forensics technology? Does it help compliance? (formerly published at techtarget.com)
  • Leaning on records management can take the angst out of e-discovery (formerly published at techtarget.com)
  • Priorities for your sound regulatory compliance management policy (formerly published at techtarget.com)
  • Put compliance management back into server virtualization (formerly published at techtarget.com)
  • Achieving compliance is about more than secure data encryption (formerly published at techtarget.com )
  • What compliance professionals shouldn’t do after data breaches (formerly published at techtarget.com)
  • Can mobile device security include risk management and compliance? (formerly published at techtarget.com )
  • Using metrics to enhance information risk management (formerly published at techtarget.com)
  • Why the Cybersecurity Act is better for government than business (formerly published at techtarget.com)
  • Why do so many people buy into “checklist” audits?
  • Data Protection and Compliance in Complex Environments (formerly published at realtimepublishers.com)
  • Enterprise iPads: Compliance risk or productivity tool? (formerly published at techtarget.com)
  • Data Protection and Compliance in Complex Environments (formerly published at realtimepublishers.com)
  • Meet compliance requirements with improved database security practices (formerly published at techtarget.com)
  • The Dangers of Over Reliance on Compliance (formerly published at cio.com)
  • Find unexpected vulnerabilities to ensure cloud compliance (formerly published at techtarget.com)
  • Getting your arms around the compliance beast
  • The lowdown on PCI compliance (formerly published at techtarget.com)
  • HIPAA-covered entities, business associates confront HITECH Act rules (formerly published at techtarget.com)
  • Security and compliance can go together, when done in the right order (formerly published at techtarget.com)
  • Data retention policies and procedures for SMBs (formerly published at techtarget.com)
  • Is all the PCI DSS compliance whining and complaining justified? (formerly published at techtarget.com)
  • Why it may not be ideal for your lawyer to be your compliance officer
  • The fine line between not encrypting your databases and breach notification (formerly published at techtarget.com)
  • The realities of PCI DSS 6.6 application code reviews (formerly published at techtarget.com)
  • Gain Control with Compliance Tools
  • Safe and secure Windows logging practices (formerly published at techtarget.com)
  • Meet compliance with improved database security practices (formerly published at techtarget.com)
  • Compliance on a budget – 10 easy steps (formerly published at techtarget.com )
  • Will the ‘regulatory police’ be knocking on your door? (formerly published at techtarget.com)
  • Getting your regulatory priorities in order (formerly published at techtarget.com)
  • Keeping SOX 404 under control(s) (formerly published at techtarget.com)
  • Key points of Sarbanes-Oxley (formerly published at techtarget.com)
  • The USA PATRIOT Act: Increasing the size of government (formerly published at techtarget.com)
  • Instilling a HIPAA Mindset (formerly published at techtarget.com)
  • HIPAA Compliance Doesn’t Come in a Box (formerly published at techtarget.com)
Whitepapers
Podcasts
  • The future of compliance policy management
Webcasts
  • Sensible HIPAA Security Compliance for Business Associates & Subcontractors
  • Ensuring PCI DSS Compliance in the Cloud (formerly published at itmanagement.com)
  • Managing network security threats with an ERM strategy (formerly published at techtarget.com)
  • Why you need to create an ESI strategy – ESI, or Electronically Stored Information, strategies have become mandatory over the past few years. This webcast focuses on how to approach the requirements ESI is designed to facilitate including e-discovery of documents for legal cases. It will also address how to organize and establish ownership of data groups, how to create a system that accesses knowledge efficiently, and how to maintain the system so it stays in compliance with various regulations.
  • How to manage the ongoing information security requirements for SOX, HIPAA, GLBA and other key regulations – a single solution – Many business leaders and IT managers believe they are in compliance with all the federal and state information security regulations affecting them. That may be true but at what cost to the organization? Being compliant in a defensive context and proactively managing compliance as an ongoing business process are very different from each other. Unfortunately, more organizations do more of the former and aren’t sure how to do the latter. In this paid webcast hosted by ComplianceOnline, you’ll learn that reducing the costs of information security compliance requires everyone speaking a common language within the organization, utilizing the proper tools, and managing information security at a high enough level to reasonably satisfy all the regulations at once. (formerly published at complianceonline.com)

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: