O'Reilly logo

The Hidden Corporation: A Data Management Security Novel by David Schlesinger

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Back in the office Basel said, I dont think I can sell top management on the idea that that Information Security should own regulatory compliance.

I agree, said Nancy. I think that Security should own enforcing documented actions to control risk. Business and legal can develop the policies and the connected actions; security can enforce and log the actions.

Here is where Information Protection leverages expertise already in the company, Nancy continued. Data Administration can take up the job of defining the informations sensitivity with the business, while our department can automate regulatory compliance using the automated tools we already use. We also achieve good separation of duties when the business ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required