RiskIT Logo

Issue 37                                                    Thursday, August 17, 2011 

 

Simplifying Agency Compliance

 

 

Oregon Initiative to Comply with IRS Rules Gains Attention

Oregon state agencies are coming together to deveop a centralized plan, ending a previously siloed approach, in an initiative to simplify compliance with Internal Revenue Service rules to safegurad taxpayer data.

Spearing heading the movenent, a more cost effective and efficient way to have agencies comply with IRS Publication 1075: Tax Information Security Guidelines for Federal, State and Local Agencies, is state chief information officer Theresa Masse.

To read this article in its entirety, please click:

Simplifying Agency Compliance

Segmenting Cardholder Data to Meet PCI Requirements

 

Segmenting in-scope PCI resources from an organization's IT infrastructure using traditional methods is quite challenging. Many have struggled with firewalls as a means of internal segmentation by inserting them in front of in-scope systems. While firewalls are a widely accepted technology for the Internet perimeter, when deployed interanally for PCI scope segmentation they have significant deficiencies.

 

  

To read this white paper in its entirety, please click:

Segmenting Cardholder Data to Meet PCI Requirements

 

 

HIPAA Modifications and HITECH Rules: A Guide to the Security Essentials

 

Sorting through all the complex security details in three new federal regulations is challenging - but essential. These rules could help set your organization's security priorities.

 

Attend this exclusive session in which noted experts will pinpoint the key provisions of a proposal to modify the HIPAA privacy and security rules, as well as two final rules for the federal electronic health record incentive program.

 

To read this article in its entirety, please click:  

HIPAA Modification and HITECH Rules...

 

 

 

Avoiding 7 Common Mistakes of IT Security Compliance

 

    

Compliance is a key driver for deployment of IT security controls, and many organizations are pursuing automation to to improve accuracy and lower costs of fulfilling requirements.

Automating controls is not just laudable - it's essential for finding and fixing a myriad of vulnerabilities that enable criminals to breach enterprise IT, disrupt electronic business processes, and steal confidential business and customer data.

 

To read this article in its entirety, please click: 

 

 Avoiding 7 Common Mistakes of IT Security Compliance

 

Gap Analysis in Supply Chain Management
 

In many industries, international trade is more of a necessity than a luxury. The ability of a company to compete and financially grow in a particular industry may depend upon tailoring a program to buy and sell goods and services from and to companies and consumers in other countries.

 

There are numerous laws (international, federal, state and local) that employees within the Supply Chain Management (SCM) Department are required to comply with in order to perform the responsibilities inherent in their jobs.

  

  

To read this article in its entirety, please click:

 

 
RiskIT Logo 
is an email publication provided by

 

Eminere Group Logo 

 

Disaster Recovery Journal

 

 

 

ISACA Logo

 

 

 

 HIMSS Logo

 

 

More Useful Links...
  
  
  
  
  
  
  
  
  
Join Our Mailing List