Article

The Convergence of Information Security, Privacy, and Compliance: Part II -- Opening Statement

Posted July 31, 2009 | Leadership | Amplify

In this issue, you'll discover how a midsized online retailer, still reeling from lawsuits and a highly public data breach, righted its course by implementing a formal risk management program with information security, privacy, and regulatory compliance components. You'll hear from a professional penetration tester, who will tell you why it's in your best interests to have someone like him (or your own IT professionals) break into your network -- and how such tests can benefit everyone from compliance and security employees to your audit and legal departments. You'll even learn how a “global governance” approach can enable you to bring “diverse economic, political, professional, and educational resources” to bear on your organization's security and privacy compliance challenges. Join Cutter Senior Consultant Rebecca Herold, one of Computerworld's “Best Privacy Advisers” of 2008, for a closer look at why this topic should be at the forefront of your agenda.

About The Author
Rebecca Herold
Rebecca Herold, CISSP, CISA, CISM, CIPM, CIPT, CIPP/US, FLMI, is CEO, The Privacy Professor; Partner, Compliance Helper; and owner/partner for HIPAACompliance.org. Ms. Herold has more than two decades of privacy and information security experience and has provided information security, privacy, and compliance services to organizations in a wide range of industries throughout the world. She has been named among the "Best Privacy Advisers"… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.