Submit Search
Upload
Compliance what does security have to do with it
•
Download as PPTX, PDF
•
0 likes
•
348 views
nCircle - a Tripwire Company
Follow
nCircle Compliance Webinar July 2012
Read less
Read more
Technology
Report
Share
Report
Share
1 of 13
Download now
Recommended
Insider Threats (RIMS 2012)
Insider Threats (RIMS 2012)
John Dillard
Cloud Security
Cloud Security
Terell Jones
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Skybox Security
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
Jason Jolley
Security on a budget
Security on a budget
nCircle - a Tripwire Company
Security Testing for Test Professionals
Security Testing for Test Professionals
TechWell
Do Security Like a Start Up or Get Fired
Do Security Like a Start Up or Get Fired
NetIQ
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. Compliance
Joshua Berman
Recommended
Insider Threats (RIMS 2012)
Insider Threats (RIMS 2012)
John Dillard
Cloud Security
Cloud Security
Terell Jones
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Skybox Security
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
Jason Jolley
Security on a budget
Security on a budget
nCircle - a Tripwire Company
Security Testing for Test Professionals
Security Testing for Test Professionals
TechWell
Do Security Like a Start Up or Get Fired
Do Security Like a Start Up or Get Fired
NetIQ
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. Compliance
Joshua Berman
Venafi 2012 risk audit survey findings
Venafi 2012 risk audit survey findings
nickjplott
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
ConSanFrancisco123
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
IT Network marcus evans
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
Shahzeb Pirzada
Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate Certification
Thomas Bronack
To dev secops or not to devsecops is that a question ?
To dev secops or not to devsecops is that a question ?
🙃 Mario Platt
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
HCL Technologies
CDW Security Practice
CDW Security Practice
timmay0220
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
Robin Lutchansky
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
HP Enterprise Italia
Forrester Infographic
Forrester Infographic
Thang Cao (He/Him)
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
Breaking Microsoft Dynamics Great Plains
Breaking Microsoft Dynamics Great Plains
surferdave71
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
Ollie Whitehouse
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
Carlos Andrés García
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
SolarWinds
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Education & Training Boards
Real world security webinar (v2012-05-30)
Real world security webinar (v2012-05-30)
nCircle - a Tripwire Company
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
nCircle - a Tripwire Company
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
Phil Agcaoili
More Related Content
What's hot
Venafi 2012 risk audit survey findings
Venafi 2012 risk audit survey findings
nickjplott
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
ConSanFrancisco123
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
IT Network marcus evans
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
Shahzeb Pirzada
Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate Certification
Thomas Bronack
To dev secops or not to devsecops is that a question ?
To dev secops or not to devsecops is that a question ?
🙃 Mario Platt
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
HCL Technologies
CDW Security Practice
CDW Security Practice
timmay0220
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
Robin Lutchansky
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
HP Enterprise Italia
Forrester Infographic
Forrester Infographic
Thang Cao (He/Him)
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
Breaking Microsoft Dynamics Great Plains
Breaking Microsoft Dynamics Great Plains
surferdave71
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
Ollie Whitehouse
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
Carlos Andrés García
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
SolarWinds
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Education & Training Boards
What's hot
(19)
Venafi 2012 risk audit survey findings
Venafi 2012 risk audit survey findings
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
Achieving Enterprise Resiliency and Corporate Certification
Achieving Enterprise Resiliency and Corporate Certification
To dev secops or not to devsecops is that a question ?
To dev secops or not to devsecops is that a question ?
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
CDW Security Practice
CDW Security Practice
Thread Fix Tour Presentation Final Final
Thread Fix Tour Presentation Final Final
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
Forrester Infographic
Forrester Infographic
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Breaking Microsoft Dynamics Great Plains
Breaking Microsoft Dynamics Great Plains
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Similar to Compliance what does security have to do with it
Real world security webinar (v2012-05-30)
Real world security webinar (v2012-05-30)
nCircle - a Tripwire Company
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
nCircle - a Tripwire Company
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
Phil Agcaoili
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
The Lorenzi Group
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
Capgemini
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
jaredcarst
The Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence Webinar
ThreatConnect
LinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security Policy
Chris Niggel
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
Patrick Florer
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Investorideas.com
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
Jason Clark
What makes an ideal breeding ground for dishonest behavior?
What makes an ideal breeding ground for dishonest behavior?
Randy Morgan CSP, CPC
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Joe Oringel
Credit Union Cyber Security
Credit Union Cyber Security
Stacy Willis
System Center 2012 - IT GRC
System Center 2012 - IT GRC
Norman Mayes
Kpi & measurement strategy - AT Internet - jump 2012
Kpi & measurement strategy - AT Internet - jump 2012
AT Internet
Continuous Monitoring 2.0
Continuous Monitoring 2.0
nCircle - a Tripwire Company
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
CipherCloud
PCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-Compliance
PCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-Compliance
khalavak
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
EMC
Similar to Compliance what does security have to do with it
(20)
Real world security webinar (v2012-05-30)
Real world security webinar (v2012-05-30)
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
The Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence Webinar
LinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security Policy
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
What makes an ideal breeding ground for dishonest behavior?
What makes an ideal breeding ground for dishonest behavior?
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Credit Union Cyber Security
Credit Union Cyber Security
System Center 2012 - IT GRC
System Center 2012 - IT GRC
Kpi & measurement strategy - AT Internet - jump 2012
Kpi & measurement strategy - AT Internet - jump 2012
Continuous Monitoring 2.0
Continuous Monitoring 2.0
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
PCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-Compliance
PCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-Compliance
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
Recently uploaded
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Overkill Security
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Recently uploaded
(20)
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Compliance what does security have to do with it
1.
Compliance: What Does
Security Have To Do With It? Thank you for joining us. The webinar will start shortly. © nCircle 2012. All rights reserved.
2.
Compliance: What Does
Security Have To Do With It? © nCircle 2012. All rights reserved.
3.
Introductions: Panelists
Rodney Brown CISSP, GIAC GISP, ITILv3 Andrew Storms Shelley Boose Dir. Security Operations Dir., Public Relation nCircle Tim Erlin Elizabeth Ireland Dir., IT Security and Risk Strategy VP, Marketing nCircle 3 © nCircle 2012 All rights reserved. nCircle Company Confidential
4.
Which compliance regulations
does your organization need to comply with? (check all that apply) SOX NERC FISMA HIPAA PCI GLBA PIPEDA Too many to name 4 © nCircle 2012 All rights reserved. nCircle Company Confidential
5.
How often does
your organization have audits? Annually Quarterly Monthly Auditors live here 5 © nCircle 2012 All rights reserved. nCircle Company Confidential
6.
Does your security
team spend too much time on audit requests? Seems like that’s all we do Audit requests take at more than half of our time Occasional resource problem We have plenty of resources to do both 6 © nCircle 2012 All rights reserved. nCircle Company Confidential
7.
In your experience,
how aligned are security and compliance efforts? Mostly aligned Somewhat aligned Barely related 7 © nCircle 2012 All rights reserved. nCircle Company Confidential
8.
Does your security
team have the necessary executive support? Yes No What executive support? 8 © nCircle 2012 All rights reserved. nCircle Company Confidential
9.
In your organization,
do security efforts suffer because compliance requirements drive the budget? Yes No 9 © nCircle 2012 All rights reserved. nCircle Company Confidential
10.
What percentage of
your security operations program is automated? 25% or less 26 – 50% more than 50% 10 © nCircle 2012 All rights reserved. nCircle Company Confidential
11.
In which of
the following types of tools has your organization invested the most budget? Vulnerability management Configuration auditing Patch management Identity and access management Antivirus and endpoint protection Penetration testing Malware detection Data loss prevention Governance risk and compliance Other 11 © nCircle 2012 All rights reserved. nCircle Company Confidential
12.
What’s the next
major tool investment your organization has planned? Vulnerability management Configuration auditing Patch management Identity and access management Antivirus and endpoint protection Penetration testing Malware detection Data loss prevention Governance risk and compliance Other 12 © nCircle 2012 All rights reserved. nCircle Company Confidential
13.
Thank you for
participating! Continue the conversation in our online community connect.ncircle.com 13 © nCircle 2012 All rights reserved. nCircle Company Confidential
Download now