When Insider Threats Meet Sarbanes-Oxley

    Date14 Feb 2006
    6780
    Posted ByBenjamin D. Thomas
    Many security practitioners divide security into three distinct but related areas: external threats, internal threats and compliance. While it is fashionable to say that security doesn’t equal compliance, and compliance doesn’t equal security, one must acknowledge that there is a tremendous amount of overlap between the two. This is certainly the case when considering Sarbanes-Oxley compliance and insider threats. Insider threat and Sarbanes-Oxley share many of the same dire consequences: loss of intellectual property, compromised data, damaged or destroyed assets and severed communications, to name a few. Failure to protect sensitive data and meet regulatory requirements can destroy customer trust, spur government fines, damage stock prices and invite lawsuits.

    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    17
    radio
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":100,"resources":[]},{"id":"67","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.