The Business Forum

"It is impossible for ideas to compete in the marketplace if no forum for
  their presentation is provided or available."           Thomas Mann, 1896


A Business Forum Round Table Luncheon
The Westin Saint Francis Hotel in San Francisco, California

Network Access Control Meets Endpoint Security
 
With Experts provided by:  Sygate Technologies, Inc.

Those accepting our invitation to attend included:  

Deputy Director, Information Technology Dept. - County of Alameda * Information Technology Consultant Jefferson Wells * Information Technology Audit Manager - Jefferson Wells * Advertising Systems Manager - San Francisco Newspaper Agency * Security Officer - City & County of San Francisco  * Senior Systems Analyst County of Alameda * Procurement Specialist - Blue Shield of California * Purchasing Manager - Blue Shield of California * Project Director - Fremont Group * Network Operations Director - EDS � Bank of America * Director of Human Resources - Bay Area Rapid Transit District * Senior Vice President - CSE Insurance Group * Team Lead  Pacific Gas & Electric * Network Manager - Orcon Corporation * Senior Counsel - McKesson Corporation Information Technology Manager - City & County of San Francisco * Architect, Information Technology Security  Siebel Systems Corporation * Director of HR Data Management - Del Monte Foods Corporation * Senior Systems Programmer - East Bay Municipal Utility District * Dir. Administrative Services - UC Hastings College of the Law * Dir. Information Technologies - Orcon Corporation - Manager Application Development - Dreyer�s Grand Ice Cream * Director of Information Security - APL Limited * County Privacy Officer - County of Napa


For the benefit of those of our members and supporters who could not
attend the meeting we present the following white papers, with contacts


Network Access Control Technologies

By Richard Langston
Contributed by Sygate Technologies, Inc.

Today, businesses must face the very real threat of their systems being compromised by misuse, misconfiguration and malicious access. In fact, Gartner estimates that 20 percent of managed systems are already compromised. Add to that their estimate that 20 percent of systems on corporate networks are entirely unmanaged and it becomes clear that most enterprises are vulnerable to loss of productivity, leakage of confidential information, and other expensive (and potentially embarrassing) abuse.


HIPAA - Final Security Rule
Information Security Reference Guide

Author: Gary Swindon
Contributed by Sygate Technologies, Inc.

The HIPAA Final Security Rule is divided into three broad categories of safeguards; administrative, physical, and technical and contains 42 security specifications. This reference guide lists the requirements of the Final Security Rule in point format with the action that needs to be taken in order to achieve compliance for Healthcare Operations by April 21, 2005, the final compliance date. More to the point it provides explanations for each specification in plain English.


Metric of Network Integrity

Author: Kevin Soo Hoo
Contributed by Sygate Technologies, Inc.

The recent spate of network worms has focused attention, once again, upon information security, particularly network security. After more than a quarter century of corporate computing, business managers and technologists alike can do little more to articulate the state of their network security than give qualitative descriptions of their "gut feel" about it. Why is this the case? Certainly, the lack of concrete metrics may confer a certain degree of job security for some, but they, alone, cannot account fully for the absence. A more plausible root cause may rest in the fast pace of innovation in network technology and the inherent difficulties associated with measuring security itself.


Examining the Sarbanes-Oxley Act

Author: Robert P. Abbott
Contributed by Sygate Technologies, Inc.

This paper briefly describes sections of the Sarbanes-Oxley Act (SOX)1 that are relevant to Information Technology (IT). The subjects of Controls and Control Objectives are introduced enroute to identifying the properties of Sygate products beneficial to complying with SOX. The bulk of the paper identifies specific control objectives wherein Sygate products provide audit evidence of compliance. A number of control objectives are also put forth as state-of-the-art contributions to the overall need for IT controls and for the automated monitoring of those controls.


Search Our Site

Search the ENTIRE Business Forum site. Search includes the Business
Forum Library, The Business Forum Journal and the Calendar Pages.


Disclaimer

The Business Forum, its Officers, partners, and all other
parties with which it deals, or is associated with, accept
absolutely no responsibility whatsoever, nor any liability,
for what is published on this web site.    Please refer to:

legal description


Home    Calendar    The Business Forum Journal     Features    Concept    History
  Library    Formats    Guest Testimonials    Client Testimonials    Experts    Search  
News Wire
      Join Why Sponsor     Tell-A-Friend     Contact The Business Forum


The Business Forum
9297 Burton Way, Suite 100
 Beverly Hills, CA 90210
 Tel: 310-550-1984 Fax: 310-550-6121
 [email protected]

webmaster: bruceclay.com