{"id":1868,"date":"2006-05-08T00:00:00","date_gmt":"2006-05-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/08\/compliance-and-security\/"},"modified":"2021-12-30T11:40:11","modified_gmt":"2021-12-30T11:40:11","slug":"compliance-and-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/08\/compliance-and-security\/","title":{"rendered":"Compliance and Security"},"content":{"rendered":"<p>There&#8217;s a tug-of-war between satisfying regulatory requirements and handling IT security, says survey.  According to the latest annual Getronics survey, half of CIOs (and other information security executives) say that spending time on meeting compliance &#8220;is a leading threat to IT security.&#8221;    &#8220;Ninety percent of surveyed companies that their security-specific budget is either constant or increasing over the prior year,&#8221; says Doug Goodall, VP of Getronics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve known for a while that meeting regulations (e.g. Sarbanes-Oxley and HIPAA) can be financially draining on enterprises, but the Getronics survey calls attention to underlying security issues.<br \/>\nIT organizations are limited in what they can achieve, and too much compliance work can take away resources from mission of securing the enterprise.<\/p>\n<p>Goodall points out that the money is coming from across several departments, indicating that IT security is not seen as only an IT issue.<\/p>\n<p>http:\/\/www.line56.com\/articles\/default.asp?ArticleID=7592<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1868","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1868"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1868\/revisions"}],"predecessor-version":[{"id":4355,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1868\/revisions\/4355"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}