The Convergence of Information Security, Privacy, and Compliance: Part II -- Opening Statement

Posted July 31, 2009 in Business Technology & Digital Transformation Strategies Cutter Business Technology Journal

In this issue, you'll discover how a midsized online retailer, still reeling from lawsuits and a highly public data breach, righted its course by implementing a formal risk management program with information security, privacy, and regulatory compliance components. You'll hear from a professional penetration tester, who will tell you why it's in your best interests to have someone like him (or your own IT professionals) break into your network -- and how such tests can benefit everyone from compliance and security employees to your audit and legal departments. You'll even learn how a “global governance” approach can enable you to bring “diverse economic, political, professional, and educational resources” to bear on your organization's security and privacy compliance challenges. Join Cutter Senior Consultant Rebecca Herold, one of Computerworld's “Best Privacy Advisers” of 2008, for a closer look at why this topic should be at the forefront of your agenda.

About The Author
Rebecca Herold
Rebecca Herold, CISSP, CISA, CISM, CIPM, CIPT, CIPP/US, FLMI, is a Senior Consultant with Cutter Consortium's Business Technology & Digital Transformation Strategies practice. She is also CEO, The Privacy Professor; Partner, Compliance Helper; and owner/partner for Ms. Herold has more than two decades of privacy and information security experience and has provided information security, privacy, and compliance services to… Read More
Not a member? Gain Access to the Cutter Experts today — register now to read select open-access articles.