"It
is impossible for ideas to compete in the marketplace if no forum for
their presentation is provided or available."
Thomas Mann, 1896
A Business Forum Round Table Luncheon
The Fairmont Olympic Hotel in Seattle, Washington
Network Auditing &
Monitoring
Providing a
Record Path for the IT Department
With Experts provided
by: Blue Lance,
Inc.
Those accepting
our invitation to attend included:
Senior
Information Technology
Auditor �
SAFECO *
Information Technology
Specialist, Risk Management �
SAFECO *
Senior
Information Technology
Analyst �
SAFECO *
Information Technology
Manager -
GM Nameplate
Inc. *
Vice President -
Network Design
& Management *
Senior Security Risk Analyst -
Russell
Investment Group *
Senior Technology Consultant -
Russell
Investment Group *
Procurement Agent & Contract Administrator �
The Boeing
Company *
Information Technology
Director -
GM Nameplate,
Inc. *
Director -
Mycroft Holmes LLP *
Senior Financial Analyst �
The Boeing Company *
Contract Auditor �
The Boeing Company
For the
benefit of those of our members and supporters who could not
attend the meeting we present the following white papers, with contacts
Security
Monitoring
Author: Bill Rudolfsky, CISSP
Contributed by: Blue Lance, Inc.
This
paper discusses the importance of including security monitoring within a
company�s best security practices and explains the difference between
�state� and �event� monitoring. Guidance is offered to deal with process
and organizational issues that could impact the ability to get a security
practice operational. Finally, the capabilities within LT Auditor+, Blue
Lance�s security monitoring solution, is reviewed to promote awareness of
the role technology plays in contributing to the effectiveness of a security
monitoring practice.
Addressing
Regulatory Compliance Issues
Author: Bill Rudolfsky, CISSP
Contributed by: Blue Lance, Inc.
In
today�s business environments, computers and information systems have become
critical tools in conducting business. The trustworthiness of these systems
that a business depends on is vital and will increasingly be of interest to
regulators. Relevant regulatory pressures depend on a number of factors,
including industry type, size of the business, the degree of non-public
information that the business processes, and the criticality of the business
to the economic well being of the United States. This paper explores the
regulatory landscape that influences the demand for information security and
specifically focuses on the role of security event monitoring within an
information security practice.
Visit the Authors Web Site
Search Our Site
Search the ENTIRE Business
Forum site. Search includes the Business
Forum Library, The Business Forum Journal and the Calendar Pages.
Disclaimer
The Business Forum, its Officers, partners, and all other
parties with which it deals, or is associated with, accept
absolutely no responsibility whatsoever, nor any liability,
for what is published on this web site. Please refer to:
legal
description
Home
Calendar The Business Forum Journal
Features
Concept
History
Library
Formats
Guest Testimonials
Client Testimonials
Experts Search
News Wire Join
Why Sponsor
Tell-A-Friend
Contact The Business Forum
The Business Forum
9297 Burton Way, Suite 100
Beverly Hills, CA 90210
Tel: 310-550-1984 Fax: 310-550-6121
[email protected]
webmaster:
bruceclay.com
|