The Convergence of Information Security, Privacy, and Compliance: Part II -- Opening Statement

You are here

The Convergence of Information Security, Privacy, and Compliance: Part II -- Opening Statement

Article
Posted July 31, 2009 in Business Technology & Digital Transformation Strategies Cutter Business Technology Journal


In this issue, you'll discover how a midsized online retailer, still reeling from lawsuits and a highly public data breach, righted its course by implementing a formal risk management program with information security, privacy, and regulatory compliance components. You'll hear from a professional penetration tester, who will tell you why it's in your best interests to have someone like him (or your own IT professionals) break into your network -- and how such tests can benefit everyone from compliance and security employees to your audit and legal departments. You'll even learn how a “global governance” approach can enable you to bring “diverse economic, political, professional, and educational resources” to bear on your organization's security and privacy compliance challenges. Join Cutter Senior Consultant Rebecca Herold, one of Computerworld's “Best Privacy Advisers” of 2008, for a closer look at why this topic should be at the forefront of your agenda.