{"id":1740,"date":"2004-02-24T00:00:00","date_gmt":"2004-02-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/02\/24\/sarbanes-oxley-doesnt-worry-most-it-managers\/"},"modified":"2021-12-30T11:39:55","modified_gmt":"2021-12-30T11:39:55","slug":"sarbanes-oxley-doesnt-worry-most-it-managers","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/02\/24\/sarbanes-oxley-doesnt-worry-most-it-managers\/","title":{"rendered":"Sarbanes-Oxley Doesn&#8217;t Worry Most IT Managers"},"content":{"rendered":"<p>Looked upon with dread by many IT managers, the Sarbanes-Oxley Act (SOX) might, in fact, not be as onerous when they actually have to face its implementation, according to a new study.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Sarbanes-Oxley is asking companies to make sure they have documenting procedures in place,&#8221; said Aberdeen&#8217;s Christa Degnan in an interview.   &#8220;Some respondents indicated that SOX compliance prompted changes in their supply-management strategies and operations, but no corresponding increases in their IT budgets,&#8221; she noted.  A few respondents, representing about 10 percent of those polled in the survey, said SOX had no impact whatsoever on their supply-chain organizations.<\/p>\n<p>What about the one-third who said SOX will have an impact on their IT and supply-chain operations?  Aberdeen found that, of the one-third considering upgrading IT operations to comply with SOX, more than 40 percent were considering beefing-up contract-management and supply-chain analytics functions.<\/p>\n<p>More info: http:\/\/www.securitypipeline.com\/news\/18200145;jsessionid=CQYMSM0OSFI3GQSNDBGCKHQ<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1740","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1740"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1740\/revisions"}],"predecessor-version":[{"id":4227,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1740\/revisions\/4227"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}