{"id":2150,"date":"2006-09-06T00:00:00","date_gmt":"2006-09-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/09\/06\/winning-the-compliance-game\/"},"modified":"2021-12-30T11:40:47","modified_gmt":"2021-12-30T11:40:47","slug":"winning-the-compliance-game","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/09\/06\/winning-the-compliance-game\/","title":{"rendered":"Winning the Compliance Game"},"content":{"rendered":"<p>The Compliance Security Council, made up of the Institute of Internal Auditors, the Computer Security Institute, and Symantec, has been tracking what&#8217;s working and what&#8217;s not, says James Hurley, executive director of research for the Security Compliance Council and a director of research at Symantec.   In the past year, about 85 percent of the organizations have been through one regulatory audit; 60 percent have been through two or more; and 80 percent, three or more.  Spending on IT security wasn&#8217;t drastically different between organizations with the best audit results and those with the worst.  The successful ones spent over 10 percent on security, and those with failures, six percent or less, Hurley says.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Auditing woes mostly stem from improperly securing user machines and servers, according to the council&#8217;s findings.  &#8220;The problems being flagged in audits are in user and access controls on PCs and laptops, audit reporting and problems in configuration change management,&#8221; Hurley says.<\/p>\n<p>Those with poor audits are spending 43 percent of their IT budget on security equipment and software for IT compliance and those with successful audits, 52 percent.  &#8220;They are taking money out of labor and putting it into automating the processes&#8221; such as measurement and monitoring IT compliance across the board, Hurley says.<\/p>\n<p>&#8220;The organizations [surveyed] doing continuous monitoring had the least number of audit deficiencies.&#8221;<\/p>\n<p>Meanwhile, security firms that perform vulnerability assessments and penetration testing say regulatory compliance is driving much of their business today.  Steve Stasiukonis, vice president and founder of Secure Network Technologies, says regulatory compliance pressures from SOX and HIPAA, for instance, are one of the main reasons his clients hire him.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=103041&#038;WT.svl=news2_5<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2150","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2150"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2150\/revisions"}],"predecessor-version":[{"id":4637,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2150\/revisions\/4637"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}